Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
Analysis ID:1436368
MD5:813b31f7ee7bbdd8e42890394ea6f16f
SHA1:31f3b24ab55399f61ca2a39055714883ba01807c
SHA256:07a437e8b997d03bc1380c93a69d19dc236dc672f737540f98c618f7b0d5908f
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Detected VMProtect packer
Drops executables to the windows directory (C:\Windows) and starts them
Hides threads from debuggers
Machine Learning detection for dropped file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe (PID: 6876 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe" MD5: 813B31F7EE7BBDD8E42890394EA6F16F)
    • Cyber.exe (PID: 6992 cmdline: "C:\tcls\Cyber.exe" MD5: E30F528038EFC32CBA51643BF67B7AF2)
      • icacls.exe (PID: 2196 cmdline: icacls "C:\Windows\" /grant Administrator:(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 7156 cmdline: icacls "C:\Windows\" /grant Administrators:(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 5820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 6272 cmdline: icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrator:(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 5460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 2640 cmdline: icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrators:(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • mbrmqqboi.exe (PID: 2200 cmdline: C:\Windows\mbrmqqboi.exe 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC l MD5: AE62909C8433ECDBE8289E3E1B5EC35E)
        • conhost.exe (PID: 980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • mbrmqqboi.exe (PID: 6276 cmdline: "C:\Windows\mbrmqqboi.exe" 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC MD5: AE62909C8433ECDBE8289E3E1B5EC35E)
          • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 6924 cmdline: sc.exe config Winmgmt start= AUTO MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
        • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Windows\mbrmqqboi.exeAvira: detection malicious, Label: HEUR/AGEN.1339215
Source: C:\tcls\Cyber.exeAvira: detection malicious, Label: LINUX/Shelma.denpe
Source: C:\Windows\mbrmqqboi.exeReversingLabs: Detection: 51%
Source: C:\Windows\mbrmqqboi.exeVirustotal: Detection: 53%Perma Link
Source: C:\tcls\Cyber.exeReversingLabs: Detection: 79%
Source: C:\tcls\Cyber.exeVirustotal: Detection: 58%Perma Link
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeReversingLabs: Detection: 70%
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeVirustotal: Detection: 63%Perma Link
Source: C:\Windows\mbrmqqboi.exeJoe Sandbox ML: detected
Source: C:\tcls\Cyber.exeJoe Sandbox ML: detected
Source: C:\tcls\Cyber.exeCode function: 1_2_032A6322 CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDestroyHash,1_2_032A6322
Source: C:\tcls\Cyber.exeCode function: 1_2_032A63B0 CryptAcquireContextA,CryptAcquireContextA,1_2_032A63B0
Source: C:\tcls\Cyber.exeCode function: 1_2_032A610D CryptEncrypt,1_2_032A610D
Source: C:\tcls\Cyber.exeCode function: 1_2_032A61D0 CryptDuplicateKey,1_2_032A61D0
Source: C:\tcls\Cyber.exeCode function: 1_2_032A6419 CryptDestroyKey,CryptDestroyKey,1_2_032A6419
Source: C:\tcls\Cyber.exeCode function: 1_2_032A64AB CryptDestroyKey,CryptDestroyKey,1_2_032A64AB
Source: C:\tcls\Cyber.exeCode function: 1_2_032A5F15 CryptDecrypt,CryptEncrypt,CryptEncrypt,1_2_032A5F15

Compliance

barindex
Source: C:\tcls\Cyber.exeUnpacked PE file: 1.2.Cyber.exe.3290000.2.unpack
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
Source: Binary string: name="naily.pdbm.exe" source: Cyber.exe
Source: Binary string: naily.pdbm.exe source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000003.1619175656.0000000000802000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000002.1642748563.0000000000802000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: cC:\tcls\Cyber.exe\??\C:\tcls\Cyber.exeen-GBenen-USnaily.pdbm.exe source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000002.1636854745.0000000000790000.00000004.00000020.00040000.00000000.sdmp
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B329F7 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00B329F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3CD67 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00B3CD67
Source: C:\tcls\Cyber.exeCode function: 1_2_103E4517 FindFirstFileW,GetLastError,__invoke_watson,1_2_103E4517
Source: Joe Sandbox ViewIP Address: 1.1.1.1 1.1.1.1
Source: Joe Sandbox ViewIP Address: 162.159.36.2 162.159.36.2
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=okFYfBKbmACV4or&MD=d2putLvK HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=okFYfBKbmACV4or&MD=d2putLvK HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: Client.dllString found in binary or memory: http://curl.haxx.se/rfc/cookie_spec.html
Source: Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://pcinfoupload.110route.com/forum.php?from=discuz
Source: Cyber.exeString found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07
Source: Cyber.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
Source: Cyber.exeString found in binary or memory: http://pki-ocsp.symauth.com0
Source: Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://sbk.sgamer.com/cyberdown.php?cc=
Source: Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://tj.110route.com/index.html
Source: Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://uploadimg.110route.com/Upload.php
Source: Client.dllString found in binary or memory: http://www.openssl.org/support/faq.html
Source: Client.dllString found in binary or memory: http://www.openssl.org/support/faq.html....................
Source: Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.yileyoo.com/help
Source: Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://beian.wwwscn.com/report.php?bd=
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.4:49736 version: TLS 1.2

System Summary

barindex
Source: Cyber.exe.0.drStatic PE information: .vmp0 and .vmp1 section names
Source: C:\tcls\Cyber.exeFile created: C:\Windows\mbrmqqboi.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B359CA0_2_00B359CA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B4C8C00_2_00B4C8C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B37A930_2_00B37A93
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B512E40_2_00B512E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B412140_2_00B41214
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B423920_2_00B42392
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B41B280_2_00B41B28
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B453520_2_00B45352
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B4CD6E0_2_00B4CD6E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B386770_2_00B38677
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B417100_2_00B41710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B317730_2_00B31773
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B41F5D0_2_00B41F5D
Source: C:\tcls\Cyber.exeCode function: 1_2_032C43201_2_032C4320
Source: C:\tcls\Cyber.exeCode function: 1_2_032D11A01_2_032D11A0
Source: C:\tcls\Cyber.exeCode function: 1_2_032B60901_2_032B6090
Source: C:\tcls\Cyber.exeCode function: 1_2_032A46371_2_032A4637
Source: C:\tcls\Cyber.exeCode function: 1_2_032CF52E1_2_032CF52E
Source: C:\tcls\Cyber.exeCode function: 1_2_032C05251_2_032C0525
Source: C:\tcls\Cyber.exeCode function: 1_2_032C34751_2_032C3475
Source: C:\tcls\Cyber.exeCode function: 1_2_0329EF471_2_0329EF47
Source: C:\tcls\Cyber.exeCode function: 1_2_03294F811_2_03294F81
Source: C:\tcls\Cyber.exeCode function: 1_2_032D2EB71_2_032D2EB7
Source: C:\tcls\Cyber.exeCode function: 1_2_032C4D001_2_032C4D00
Source: C:\tcls\Cyber.exeCode function: 1_2_032D8D711_2_032D8D71
Source: C:\tcls\Cyber.exeCode function: 1_2_032A4C8B1_2_032A4C8B
Source: C:\tcls\Cyber.exeCode function: 1_2_032DBCE01_2_032DBCE0
Source: C:\tcls\Cyber.exeCode function: 1_2_102811D01_2_102811D0
Source: C:\tcls\Cyber.exeCode function: 1_2_102816881_2_10281688
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040C9C010_2_0040C9C0
Source: C:\tcls\Cyber.exeCode function: String function: 032C4A3A appears 89 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: String function: 00B3F4B0 appears 44 times
Source: C:\Windows\mbrmqqboi.exeCode function: String function: 00405950 appears 33 times
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal100.evad.winEXE@23/3@0/6
Source: C:\tcls\Cyber.exeCode function: 1_2_10481960 FSDK_GetCameraList,CoCreateInstance,1_2_10481960
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:980:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5820:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5608:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5308:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_03
Source: C:\tcls\Cyber.exeMutant created: \Sessions\1\BaseNamedObjects\ClientWWWS
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5460:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCommand line argument: sfxname0_2_00B3E8DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCommand line argument: sfxstime0_2_00B3E8DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCommand line argument: STARTDLG0_2_00B3E8DE
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\tcls\Cyber.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\mbrmqqboi.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\mbrmqqboi.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Cyber.exe, Cyber.exe, 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Cyber.exe, 00000001.00000002.2884767342.00000000000D6000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: Cyber.exe, Cyber.exe, 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Cyber.exe, 00000001.00000002.2884767342.00000000000D6000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: Cyber.exe, 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Cyber.exe, 00000001.00000002.2884767342.00000000000D6000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name, %d+18,10) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: Cyber.exe, Cyber.exe, 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Cyber.exe, 00000001.00000002.2884767342.00000000000D6000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#0,%Q);
Source: Cyber.exe, Cyber.exe, 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Cyber.exe, 00000001.00000002.2884767342.00000000000D6000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';'FROM sqlite_master WHERE type = 'table' AND name!='sqlite_sequence';
Source: Cyber.exe, Cyber.exe, 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Cyber.exe, 00000001.00000002.2884767342.00000000000D6000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeReversingLabs: Detection: 70%
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeVirustotal: Detection: 63%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeProcess created: C:\tcls\Cyber.exe "C:\tcls\Cyber.exe"
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Windows\" /grant Administrator:(OI)(CI)F
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Windows\" /grant Administrators:(OI)(CI)F
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrator:(OI)(CI)F
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrators:(OI)(CI)F
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\mbrmqqboi.exe C:\Windows\mbrmqqboi.exe 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC l
Source: C:\Windows\mbrmqqboi.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\sc.exe sc.exe config Winmgmt start= AUTO
Source: C:\Windows\SysWOW64\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\mbrmqqboi.exeProcess created: C:\Windows\mbrmqqboi.exe "C:\Windows\mbrmqqboi.exe" 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeProcess created: C:\tcls\Cyber.exe "C:\tcls\Cyber.exe" Jump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Windows\" /grant Administrator:(OI)(CI)FJump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Windows\" /grant Administrators:(OI)(CI)FJump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrator:(OI)(CI)FJump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrators:(OI)(CI)FJump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\mbrmqqboi.exe C:\Windows\mbrmqqboi.exe 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC lJump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\sc.exe sc.exe config Winmgmt start= AUTOJump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess created: C:\Windows\mbrmqqboi.exe "C:\Windows\mbrmqqboi.exe" 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958ECJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: dxgidebug.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeSection loaded: mpr.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: apphelp.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: mpr.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: version.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wsock32.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: quartz.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wininet.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: netapi32.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wininet.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: winmm.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wldp.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: olepro32.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: mswsock.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: napinsp.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wshbth.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: winrnr.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: client.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: ieframe.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: iertutil.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: userenv.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: winhttp.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wkscli.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: netutils.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wintypes.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wintypes.dllJump to behavior
Source: C:\tcls\Cyber.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\mbrmqqboi.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic file information: File size 15256203 > 1048576
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
Source: Binary string: name="naily.pdbm.exe" source: Cyber.exe
Source: Binary string: naily.pdbm.exe source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000003.1619175656.0000000000802000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000002.1642748563.0000000000802000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: cC:\tcls\Cyber.exe\??\C:\tcls\Cyber.exeen-GBenen-USnaily.pdbm.exe source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000002.1636854745.0000000000790000.00000004.00000020.00040000.00000000.sdmp
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: C:\tcls\Cyber.exeUnpacked PE file: 1.2.Cyber.exe.3290000.2.unpack
Source: C:\tcls\Cyber.exeCode function: 1_2_032DB7E4 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_032DB7E4
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeFile created: C:\tcls\__tmp_rar_sfx_access_check_6149296Jump to behavior
Source: Cyber.exe.0.drStatic PE information: section name: .vmp0
Source: Cyber.exe.0.drStatic PE information: section name: .vmp1
Source: mbrmqqboi.exe.1.drStatic PE information: section name: .WMV0
Source: mbrmqqboi.exe.1.drStatic PE information: section name: .WMV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B400F6 push ecx; ret 0_2_00B40109
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B359BA push dword ptr [ebp+03046A00h]; ret 0_2_00B359C4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3F484 push eax; ret 0_2_00B3F4A2
Source: C:\tcls\Cyber.exeCode function: 1_2_032D5370 push eax; ret 1_2_032D539E
Source: C:\tcls\Cyber.exeCode function: 1_2_103EB47D push ecx; ret 1_2_103EB490
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_004055D4 push 00405639h; ret 10_2_00405631
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040586E push 0040589Ch; ret 10_2_00405894
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00405870 push 0040589Ch; ret 10_2_00405894
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409834 push 004098A3h; ret 10_2_0040989B
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040C968 push 0040C9B6h; ret 10_2_0040C9AE
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00405119 push eax; ret 10_2_00405155
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040D1A4 push 0040D1D0h; ret 10_2_0040D1C8
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00405A00 push 00405A2Ch; ret 10_2_00405A24
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00405A38 push 00405CF4h; ret 10_2_00405CEC
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409BC8 push 00409BFCh; ret 10_2_00409BF4
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409BD0 push 00409BFCh; ret 10_2_00409BF4
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409B90 push 00409BBCh; ret 10_2_00409BB4
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409C40 push 00409C74h; ret 10_2_00409C6C
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409C48 push 00409C74h; ret 10_2_00409C6C
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409C08 push 00409C34h; ret 10_2_00409C2C
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040D42E push 0040D456h; ret 10_2_0040D44E
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040D430 push 0040D456h; ret 10_2_0040D44E
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00405CC8 push 00405CF4h; ret 10_2_00405CEC
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409CF0 push 00409D74h; ret 10_2_00409D6C
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409C80 push 00409CACh; ret 10_2_00409CA4
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409CB8 push 00409CE4h; ret 10_2_00409CDC
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409D48 push 00409D74h; ret 10_2_00409D6C
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409DAB push 00409DF9h; ret 10_2_00409DF1
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00409DAC push 00409DF9h; ret 10_2_00409DF1
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040C5B6 push 0040C66Bh; ret 10_2_0040C663
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_0040C5B8 push 0040C66Bh; ret 10_2_0040C663
Source: mbrmqqboi.exe.1.drStatic PE information: section name: .WMV1 entropy: 7.963072884561921

Persistence and Installation Behavior

barindex
Source: C:\Windows\mbrmqqboi.exeExecutable created and started: C:\Windows\mbrmqqboi.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeFile created: C:\tcls\Client.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeFile created: C:\tcls\Cyber.exeJump to dropped file
Source: C:\tcls\Cyber.exeFile created: C:\Windows\mbrmqqboi.exeJump to dropped file
Source: C:\tcls\Cyber.exeFile created: C:\Windows\mbrmqqboi.exeJump to dropped file
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\sc.exe sc.exe config Winmgmt start= AUTO

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 1070005 value: E9 2B BA E5 75 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 76ECBA30 value: E9 DA 45 1A 8A Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 1090008 value: E9 8B 8E E8 75 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 76F18E90 value: E9 80 71 17 8A Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 10A0005 value: E9 8B 4D B5 74 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 75BF4D90 value: E9 7A B2 4A 8B Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 10C0005 value: E9 EB EB B4 74 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 75C0EBF0 value: E9 1A 14 4B 8B Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 10D0005 value: E9 8B 8A F0 73 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 74FD8A90 value: E9 7A 75 0F 8C Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 10F0005 value: E9 2B 02 F1 73 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 75000230 value: E9 DA FD 0E 8C Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 2CA0005 value: E9 8B 2F 26 74 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 76F02F90 value: E9 7A D0 D9 8B Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 2CB0007 value: E9 EB DF 28 74 Jump to behavior
Source: C:\tcls\Cyber.exeMemory written: PID: 6992 base: 76F3DFF0 value: E9 1E 20 D7 8B Jump to behavior
Source: C:\tcls\Cyber.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Windows\" /grant Administrator:(OI)(CI)F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\tcls\Cyber.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\tcls\Cyber.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\tcls\Cyber.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: Cyber.exe, 00000001.00000002.2884996615.0000000000144000.00000020.00000001.01000000.00000007.sdmpBinary or memory string: >SBIEDLL.DLL
Source: C:\tcls\Cyber.exeRDTSC instruction interceptor: First address: 4CAB14 second address: 4CAB1A instructions: 0x00000000 rdtsc 0x00000002 popfd 0x00000003 pop esi 0x00000004 cbw 0x00000006 rdtsc
Source: C:\tcls\Cyber.exeSpecial instruction interceptor: First address: ACEE0C instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00413D89 rdtsc 10_2_00413D89
Source: C:\Windows\mbrmqqboi.exeWindow / User API: threadDelayed 498Jump to behavior
Source: C:\tcls\Cyber.exeAPI coverage: 0.5 %
Source: C:\Windows\mbrmqqboi.exeAPI coverage: 0.0 %
Source: C:\Windows\mbrmqqboi.exe TID: 864Thread sleep time: -7470000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B329F7 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00B329F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3CD67 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00B3CD67
Source: C:\tcls\Cyber.exeCode function: 1_2_103E4517 FindFirstFileW,GetLastError,__invoke_watson,1_2_103E4517
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3F017 VirtualQuery,GetSystemInfo,0_2_00B3F017
Source: Client.dllBinary or memory string: VMware
Source: SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, 00000000.00000002.1642748563.0000000000802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: Cyber.exe, 00000001.00000002.2886870763.000000000110E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllR
Source: Client.dllBinary or memory string: ANYTHING!VMwareHamachiPseudoJuniper Network Connect Virtual AdapterCisco AnyConnect VPNCisco Systems VPNMicrosoft%02x:%02x:%02x:%02x:%02x:%02x
Source: Cyber.exe, 00000001.00000003.1647597085.0000000001136000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeAPI call chain: ExitProcess graph end nodegraph_0-18400
Source: C:\tcls\Cyber.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\tcls\Cyber.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\tcls\Cyber.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\mbrmqqboi.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\mbrmqqboi.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\tcls\Cyber.exeSystem information queried: KernelDebuggerInformationJump to behavior
Source: C:\tcls\Cyber.exeProcess queried: DebugPortJump to behavior
Source: C:\tcls\Cyber.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\mbrmqqboi.exeCode function: 10_2_00413D89 rdtsc 10_2_00413D89
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B4855B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B4855B
Source: C:\tcls\Cyber.exeCode function: 1_2_032DB7E4 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_032DB7E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B47439 mov eax, dword ptr fs:[00000030h]0_2_00B47439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B4B4B6 GetProcessHeap,0_2_00B4B4B6
Source: C:\tcls\Cyber.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B4004A SetUnhandledExceptionFilter,0_2_00B4004A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B40358 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B40358
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B4855B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B4855B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3FEB8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B3FEB8
Source: C:\tcls\Cyber.exeCode function: 1_2_103E2766 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_103E2766
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeProcess created: C:\tcls\Cyber.exe "C:\tcls\Cyber.exe" Jump to behavior
Source: C:\Windows\mbrmqqboi.exeProcess created: C:\Windows\mbrmqqboi.exe "C:\Windows\mbrmqqboi.exe" 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958ECJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3FD07 cpuid 0_2_00B3FD07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00B3BBF0
Source: C:\Windows\mbrmqqboi.exeCode function: RegOpenKeyExA,RegOpenKeyExA,GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,10_2_004047D4
Source: C:\Windows\mbrmqqboi.exeCode function: GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,10_2_004048A6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B3E8DE OleInitialize,GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,LoadBitmapW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,0_2_00B3E8DE
Source: C:\tcls\Cyber.exeCode function: 1_2_032D7BED GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,1_2_032D7BED
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeCode function: 0_2_00B32B7C GetVersionExW,0_2_00B32B7C
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD203 sqlite3_transfer_bindings,1_2_032CD203
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD185 sqlite3_bind_parameter_index,1_2_032CD185
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD078 sqlite3_bind_text16,1_2_032CD078
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD040 sqlite3_bind_null,1_2_032CD040
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD055 sqlite3_bind_text,1_2_032CD055
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD0A8 sqlite3_bind_parameter_count,1_2_032CD0A8
Source: C:\tcls\Cyber.exeCode function: 1_2_032CD0D3 sqlite3_bind_parameter_name,1_2_032CD0D3
Source: C:\tcls\Cyber.exeCode function: 1_2_032CCF89 sqlite3_bind_double,1_2_032CCF89
Source: C:\tcls\Cyber.exeCode function: 1_2_032CCFF2 sqlite3_bind_int64,1_2_032CCFF2
Source: C:\tcls\Cyber.exeCode function: 1_2_032CCFD7 sqlite3_bind_int,1_2_032CCFD7
Source: C:\tcls\Cyber.exeCode function: 1_2_032CCDFB sqlite3_bind_blob,1_2_032CCDFB
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
12
Masquerading
1
Credential API Hooking
2
System Time Discovery
Remote Services1
Credential API Hooking
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Service Execution
1
Services File Permissions Weakness
11
Process Injection
13
Virtualization/Sandbox Evasion
LSASS Memory551
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Native API
1
DLL Side-Loading
1
Services File Permissions Weakness
11
Process Injection
Security Account Manager13
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Services File Permissions Weakness
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
Software Packing
DCSync225
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1436368 Sample: SecuriteInfo.com.Trojan.Mul... Startdate: 04/05/2024 Architecture: WINDOWS Score: 100 63 Multi AV Scanner detection for submitted file 2->63 65 Detected VMProtect packer 2->65 9 SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe 5 2->9         started        process3 file4 43 C:\tcls\Cyber.exe, PE32 9->43 dropped 45 C:\tcls\Client.dll, PE32 9->45 dropped 12 Cyber.exe 1 9->12         started        process5 dnsIp6 49 20.114.59.183, 443, 49730, 49736 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 12->49 51 199.232.210.172, 49723, 49724, 80 FASTLYUS United States 12->51 53 4 other IPs or domains 12->53 47 C:\Windows\mbrmqqboi.exe, PE32 12->47 dropped 69 Antivirus detection for dropped file 12->69 71 Multi AV Scanner detection for dropped file 12->71 73 Detected unpacking (creates a PE file in dynamic memory) 12->73 75 6 other signatures 12->75 17 mbrmqqboi.exe 2 12->17         started        20 icacls.exe 1 12->20         started        22 icacls.exe 1 12->22         started        24 3 other processes 12->24 file7 signatures8 process9 signatures10 55 Antivirus detection for dropped file 17->55 57 Multi AV Scanner detection for dropped file 17->57 59 Machine Learning detection for dropped file 17->59 61 2 other signatures 17->61 26 mbrmqqboi.exe 1 17->26         started        29 conhost.exe 17->29         started        31 conhost.exe 20->31         started        33 conhost.exe 22->33         started        35 conhost.exe 24->35         started        37 conhost.exe 24->37         started        39 conhost.exe 24->39         started        process11 signatures12 67 Hides threads from debuggers 26->67 41 conhost.exe 26->41         started        process13

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe71%ReversingLabsWin32.Trojan.Shelma
SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe63%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Windows\mbrmqqboi.exe100%AviraHEUR/AGEN.1339215
C:\tcls\Cyber.exe100%AviraLINUX/Shelma.denpe
C:\Windows\mbrmqqboi.exe100%Joe Sandbox ML
C:\tcls\Cyber.exe100%Joe Sandbox ML
C:\Windows\mbrmqqboi.exe51%ReversingLabsWin32.Trojan.Generic
C:\Windows\mbrmqqboi.exe54%VirustotalBrowse
C:\tcls\Client.dll0%ReversingLabs
C:\tcls\Client.dll0%VirustotalBrowse
C:\tcls\Cyber.exe79%ReversingLabsWin32.Trojan.Shelma
C:\tcls\Cyber.exe58%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pki-ocsp.symauth.com00%URL Reputationsafe
http://www.yileyoo.com/help0%Avira URL Cloudsafe
http://uploadimg.110route.com/Upload.php0%Avira URL Cloudsafe
http://tj.110route.com/index.html0%Avira URL Cloudsafe
http://pcinfoupload.110route.com/forum.php?from=discuz0%Avira URL Cloudsafe
https://beian.wwwscn.com/report.php?bd=0%Avira URL Cloudsafe
http://www.yileyoo.com/help0%VirustotalBrowse
http://tj.110route.com/index.html2%VirustotalBrowse
https://beian.wwwscn.com/report.php?bd=0%VirustotalBrowse
http://pcinfoupload.110route.com/forum.php?from=discuz2%VirustotalBrowse
http://uploadimg.110route.com/Upload.php0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://sbk.sgamer.com/cyberdown.php?cc=Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpfalse
    high
    http://www.yileyoo.com/helpCyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://beian.wwwscn.com/report.php?bd=Cyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crCyber.exefalse
      high
      http://curl.haxx.se/rfc/cookie_spec.htmlClient.dllfalse
        high
        http://pcinfoupload.110route.com/forum.php?from=discuzCyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpfalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07Cyber.exefalse
          high
          http://pki-ocsp.symauth.com0Cyber.exefalse
          • URL Reputation: safe
          unknown
          http://uploadimg.110route.com/Upload.phpCyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.openssl.org/support/faq.html....................Client.dllfalse
            high
            http://tj.110route.com/index.htmlCyber.exe, 00000001.00000002.2884433228.0000000000011000.00000020.00000001.01000000.00000007.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.openssl.org/support/faq.htmlClient.dllfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              20.114.59.183
              unknownUnited States
              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              162.159.36.2
              unknownUnited States
              13335CLOUDFLARENETUSfalse
              199.232.210.172
              unknownUnited States
              54113FASTLYUSfalse
              IP
              192.168.2.1
              192.168.2.4
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1436368
              Start date and time:2024-05-04 20:25:07 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 57s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:20
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
              Detection:MAL
              Classification:mal100.evad.winEXE@23/3@0/6
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 91%
              • Number of executed functions: 80
              • Number of non-executed functions: 161
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 72.21.81.240, 192.229.211.108
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtSetInformationFile calls found.
              TimeTypeDescription
              20:25:56API Interceptor498x Sleep call for process: mbrmqqboi.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              1.1.1.1PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
              • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
              AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
              • 1.1.1.1/
              INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
              • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
              Go.exeGet hashmaliciousUnknownBrowse
              • 1.1.1.1/
              20.114.59.183W9vVOVhMMq.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                b6HXTGQmJN.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                  162.159.36.2EGQqjPn5p3.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
                    file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                      j1FDxfhkS3.exeGet hashmaliciousGlupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                        ZN5KdHxjL1.exeGet hashmaliciousWannacryBrowse
                          W9vVOVhMMq.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                            b6HXTGQmJN.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                              199.232.210.172VOrqSh1Fts.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                http://launch.getgo.com/launcher2/helper?token=e0-JlwZpYnk5RjfhNwQJAWSnycGxuTNEKMFcGUnp8bMbh1HaoP3nxnwmbsPoRN3nHS6IqeGWl2BtZZUCiukZPAadAO_rWBJQKlxiyBmgLzhLL5R1ewSQF5jnb934RWY3OJM4kRqjf_0K6R7ugG8LH4WlOOqPNJSmMAD3RS6UgEzBOJaT4rPu0bb59qQi8o861c7OLxMI07Ibv0hJmk7HIy2a92xS-gyU5pKlOvVQGniMuxPSF1Y2k0dJ7ra2hAUmCxtd7ob9yDXB05la9g0bQ38dMF0kvhP2rIVGwG36NAwouMDXY-2MML1XoElq2qVGdets-czFXiGaDVyOFme0t6cF1YereSTdXIEtXIzFxS1lrYL3AiV4hFsDVKqI1kqih-PHY4ks3RqBBIj3H1iVlVq_2U3M6VZflUvwyNSk_ZcHfCbJHyTQt10oMuj0lOFvXOTuhJST9RLaFmO5ibIH5ghIchA_BWTrCyQVmuuQQoEQ-jWemgg7keHjSvL1bR2V_VwnqgTgcf_VuVAuqEEQIekmsEEzCXev7G-pEchKLy2fT1tAyJJH9VB4Yx_vAKsd_0C38BiMHPEYdOMSboIQg-rfko0GyZWpzeel94gvtGvyMHY-jXpYAwX_2iK2KJpkVnbzstjnbhvopB2XYgkB4GiaV845Xp274vfZNI7_XUn7Ih_SbuB&downloadTrigger=javascript&renameFile=1Get hashmaliciousUnknownBrowse
                                  https://webex-install.comGet hashmaliciousNetSupport RATBrowse
                                    digitalform.msiGet hashmaliciousAteraAgentBrowse
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUS7Ql51TchBG.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                      • 172.67.169.18
                                      INVOICE KAD-0138-2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      Orden de compra 0001-00255454.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                      • 172.67.177.134
                                      0KRPn.vbsGet hashmaliciousAgentTeslaBrowse
                                      • 104.21.45.138
                                      Supplier Order Scan 0001293039493.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                      • 104.26.13.205
                                      file.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 104.26.12.205
                                      DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                                      • 104.21.45.138
                                      MICROSOFT-CORP-MSN-AS-BLOCKUSOgcktrbHkI.exeGet hashmaliciousTofseeBrowse
                                      • 104.47.53.36
                                      1CMweaqlKp.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 13.89.179.12
                                      sora.x86-20240504-0115.elfGet hashmaliciousMiraiBrowse
                                      • 20.199.232.188
                                      https://www.bjvpza.cn/Get hashmaliciousUnknownBrowse
                                      • 13.107.213.40
                                      https://www.uhnrya.cn/Get hashmaliciousUnknownBrowse
                                      • 13.107.213.69
                                      https://portal.cpscompressors.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.71
                                      https://www.soqsrkk.cn/Get hashmaliciousUnknownBrowse
                                      • 13.107.246.69
                                      https://www.evernote.com/shard/s593/sh/34d5323e-5e68-2022-e399-8b6a9f22d260/e4DIh4rAMOdx8UQxrqSgHb8GiJxwwBeZjn9dT_57KOFldDUBp5VNPxZHmw/res/782d1fe9-3270-5412-662f-9e3e990fa372Get hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.40
                                      Copy of BARBOT CONSTRUCTION.xlsxGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                      • 52.109.28.46
                                      Scanned from Xerox KwlawMultiftr.rtfGet hashmaliciousHTMLPhisherBrowse
                                      • 52.109.52.131
                                      FASTLYUShttps://www.bjvpza.cn/Get hashmaliciousUnknownBrowse
                                      • 151.101.65.195
                                      https://broken-rain-1a74.1rwvvy66.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                      • 151.101.66.137
                                      https://www.uhnrya.cn/Get hashmaliciousUnknownBrowse
                                      • 151.101.65.195
                                      https://jango.petGet hashmaliciousUnknownBrowse
                                      • 151.101.66.137
                                      https://portal.cpscompressors.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                      • 151.101.66.137
                                      https://collettre-7jk.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                      • 151.101.194.137
                                      https://www.soqsrkk.cn/Get hashmaliciousUnknownBrowse
                                      • 151.101.65.195
                                      http://jango.petGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                      • 151.101.66.137
                                      https://www.sqrhpva.cn/Get hashmaliciousUnknownBrowse
                                      • 199.232.214.128
                                      https://www.evernote.com/shard/s593/sh/34d5323e-5e68-2022-e399-8b6a9f22d260/e4DIh4rAMOdx8UQxrqSgHb8GiJxwwBeZjn9dT_57KOFldDUBp5VNPxZHmw/res/782d1fe9-3270-5412-662f-9e3e990fa372Get hashmaliciousHTMLPhisherBrowse
                                      • 151.101.65.197
                                      CLOUDFLARENETUS7Ql51TchBG.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                      • 172.67.169.18
                                      INVOICE KAD-0138-2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      Orden de compra 0001-00255454.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                      • 172.67.177.134
                                      0KRPn.vbsGet hashmaliciousAgentTeslaBrowse
                                      • 104.21.45.138
                                      Supplier Order Scan 0001293039493.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                      • 104.26.13.205
                                      file.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 104.26.12.205
                                      DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 172.67.74.152
                                      E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                                      • 104.21.45.138
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      28a2c9bd18a11de089ef85a160da29e4OgcktrbHkI.exeGet hashmaliciousTofseeBrowse
                                      • 20.114.59.183
                                      SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen.18101.30858.exeGet hashmaliciousUnknownBrowse
                                      • 20.114.59.183
                                      mBW2MzlcHN.exeGet hashmaliciousLockBit ransomware, PureLog StealerBrowse
                                      • 20.114.59.183
                                      eiQXaKJ75nCjEWn.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 20.114.59.183
                                      0e46.scr.exeGet hashmaliciousAgentTeslaBrowse
                                      • 20.114.59.183
                                      Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                                      • 20.114.59.183
                                      Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 20.114.59.183
                                      #U00d6deme tavsiyesi.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 20.114.59.183
                                      E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                                      • 20.114.59.183
                                      4365078236450.LnK.lnkGet hashmaliciousUnknownBrowse
                                      • 20.114.59.183
                                      No context
                                      Process:C:\tcls\Cyber.exe
                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):344064
                                      Entropy (8bit):7.954625895452996
                                      Encrypted:false
                                      SSDEEP:6144:vheZ5ndgOAWcTYZqKjwTdkPSSxG/9m/R36kSt2Kskibq4mcoo2:vhy5ndg/lT8qKjudu/RKkT/qcR2
                                      MD5:AE62909C8433ECDBE8289E3E1B5EC35E
                                      SHA1:D1D8302130ADA1B22D18D3E5A3B4FCACC60D3340
                                      SHA-256:6CF2B9A34AB1F04433DF6E6B0284777EAB479C3C0D855C2462DF17CB88FFA167
                                      SHA-512:CF2F8F62F80C839358EA81E7A4FB2BE36D0F905E3D82A303440852C18A7E232ABF5F2F360C8C3814E3D0EE240A7E083D12110DB64691F9D4C83E36BEE41CD86D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 51%
                                      • Antivirus: Virustotal, Detection: 54%, Browse
                                      Reputation:low
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................8......x.............@..............................................@...................J..P...(................................................................... .......................X...........................CODE................................ ..`DATA....L...........................@...BSS......................................idata..............................@....tls.....................................rdata....... ......................@..P.WMV0....d...0......................`....WMV1....8.......:..................`....rsrc................>..............@..P........................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):20037632
                                      Entropy (8bit):6.637497816081563
                                      Encrypted:false
                                      SSDEEP:393216:iMIpYEbN9vTwB8gM9iadWsoQ8lFGXhJRHDoqTKSU8KRDYbJtcjtzNCS7SLXSEu0J:iMIpYEbN9vTwBNUiadrovlFGXhjP7KRA
                                      MD5:76EB13182111ADDD7F0AF02BC8C17420
                                      SHA1:99E249DD8A7FAFFB3E185B54FE2022DFB244637B
                                      SHA-256:A3841858E540AA052CE043D231CC32B23D5E3C977E4E95AEAC5611F1BC31F35C
                                      SHA-512:98AC0B075A02F08D5057C3C425934C76B99F4C68D9C12E297B590A655F5A833370F0CF752B208B9CB348EB61183A5D7B726CF968422F174E96E37C9156A95F1C
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......&..b..Fb..Fb..F..tFe..F|.wFW..F|.aF..FEN.Fs..Fb..F...Fk.aF...Fb..F...FEN.F...Fg..F7..F|.fF"..FEN.Fa..Fk.hF_..Fk.pFc..F|.vFc..Fb.uFc..Fk.sFc..FRichb..F........PE..L....f.N...........!......H..".......R>.......H...............................8.......#.............................09p.@....+p.......'.0.............".@.....6. 1..................................0.p.@.............H..............................text.....H.......H................. ..`.rdata..p.'...H...'...H.............@..@.data...(....Pp.....6p.............@....rsrc...0.....'....... .............@..@.reloc........6......./.............@..B........................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):5338624
                                      Entropy (8bit):7.997345410431866
                                      Encrypted:true
                                      SSDEEP:98304:e+7UX9OhhuzVIxoi8Qov105OKvgK61esFrG0Xxu/Dv7ICZ06s68r24cGE:erXSQVe8Xd05OB1esFrG0oDTI8TIy
                                      MD5:E30F528038EFC32CBA51643BF67B7AF2
                                      SHA1:2F09511FB2057E85A51487221D4C9DEB5B234695
                                      SHA-256:E6544E5013F949FBB7F478B2857811E62AC3E1C58961177A68F6A5C043FA80A5
                                      SHA-512:B4FEF9D3D5AD5C1F52B26767B8D9D2A7B87D5D33B69F28802D93E24F1BB263CDF4648899CC4370EC34F4DCF70FEFB9F96D14ABFA8589841BFB92A37674C52152
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 79%
                                      • Antivirus: Virustotal, Detection: 58%, Browse
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................P...\......'.[......`...............................@...................@....................f.O...._].........%"...................................................Y........................c.|...........................CODE....TO.......................... ..`DATA....l....`......................@...BSS......B...............................idata..v4..........................@....tls......... ...........................rdata.......0......................@..P.vmp0....qH..@......................`..`.vmp1....LQ...[..NQ.................`..`.rsrc...%".......$...RQ.............@..P........................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.995894383607539
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                      File size:15'256'203 bytes
                                      MD5:813b31f7ee7bbdd8e42890394ea6f16f
                                      SHA1:31f3b24ab55399f61ca2a39055714883ba01807c
                                      SHA256:07a437e8b997d03bc1380c93a69d19dc236dc672f737540f98c618f7b0d5908f
                                      SHA512:8c216ea0d1ca43ffaca7a4370a1fd3142faedcf395fa0f37639b314b3675ecbf50e883c9b6ca57086ee1bed3138d9f5805c219df57ca8ef99b710b110c5ca90d
                                      SSDEEP:393216:myEVlfhmA+m6RNWYL0YIl4NJrjC/s9gGj5fbD:SlZnL6fHL1NNJKE9gW5ff
                                      TLSH:20E633B29BDD95B0CC13587087B8FF72903698010759279F0291EA7DBFB29948D7A273
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.}.on..on..on......bn.......n......wn...3..yn...3..|n...3..En..f...en..f...ln..on...n...3..Mn...3..nn...3..nn...3..nn..Richon.
                                      Icon Hash:2775250905472797
                                      Entrypoint:0x40fce7
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x57B0C36A [Sun Aug 14 19:15:54 2016 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:49091c5c46d1ed156931ed11f43d3afa
                                      Instruction
                                      call 00007FBC31431ACEh
                                      jmp 00007FBC31431445h
                                      cmp ecx, dword ptr [0042B0A8h]
                                      jne 00007FBC314315C5h
                                      ret
                                      jmp 00007FBC31431C44h
                                      jmp 00007FBC3143624Eh
                                      push ebp
                                      mov ebp, esp
                                      and dword ptr [00457960h], 00000000h
                                      sub esp, 2Ch
                                      push ebx
                                      xor ebx, ebx
                                      inc ebx
                                      or dword ptr [0042B0ACh], ebx
                                      push 0000000Ah
                                      call 00007FBC31443182h
                                      test eax, eax
                                      je 00007FBC3143173Ah
                                      and dword ptr [ebp-14h], 00000000h
                                      xor eax, eax
                                      or dword ptr [0042B0ACh], 02h
                                      xor ecx, ecx
                                      push esi
                                      push edi
                                      mov dword ptr [00457960h], ebx
                                      lea edi, dword ptr [ebp-2Ch]
                                      push ebx
                                      cpuid
                                      mov esi, ebx
                                      pop ebx
                                      mov dword ptr [edi], eax
                                      mov dword ptr [edi+04h], esi
                                      mov dword ptr [edi+08h], ecx
                                      mov dword ptr [edi+0Ch], edx
                                      mov eax, dword ptr [ebp-2Ch]
                                      mov ecx, dword ptr [ebp-20h]
                                      mov dword ptr [ebp-0Ch], eax
                                      xor ecx, 49656E69h
                                      mov eax, dword ptr [ebp-24h]
                                      xor eax, 6C65746Eh
                                      or ecx, eax
                                      mov eax, dword ptr [ebp-28h]
                                      xor eax, 756E6547h
                                      or ecx, eax
                                      neg ecx
                                      push 00000001h
                                      pop eax
                                      sbb cl, cl
                                      push 00000000h
                                      add cl, 00000001h
                                      pop ecx
                                      push ebx
                                      cpuid
                                      mov esi, ebx
                                      pop ebx
                                      mov dword ptr [edi], eax
                                      mov dword ptr [edi+04h], esi
                                      mov dword ptr [edi+08h], ecx
                                      mov dword ptr [edi+0Ch], edx
                                      je 00007FBC31431605h
                                      mov eax, dword ptr [ebp-2Ch]
                                      and eax, 0FFF3FF0h
                                      cmp eax, 000106C0h
                                      je 00007FBC314315E5h
                                      cmp eax, 00020660h
                                      Programming Language:
                                      • [ C ] VS2008 SP1 build 30729
                                      • [IMP] VS2008 SP1 build 30729
                                      • [C++] VS2015 UPD2 build 23918
                                      • [EXP] VS2015 UPD2 build 23918
                                      • [RES] VS2015 UPD2 build 23918
                                      • [LNK] VS2015 UPD2 build 23918
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2a5100x34.rdata
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2a5440x28.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x39c4.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000x2354.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x28c200x54.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x235c00x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x220000x1d8.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x29bd40x100.rdata
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x20f770x21000792daf1ebbf0f019d3486580dfe317d1False0.5852790601325758data6.621622506076134IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x220000x8fd40x90009d62ca750ab21611bd69d7a3e5333d52False0.4624565972222222data5.135489014865361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x2b0000x2d3700xc00ab0f244b352be8b4c7ffac28b0999542False0.23697916666666666data2.7652001050956354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .gfids0x590000xfc0x2007af9f45b4511d68a2575fde63622b162False0.353515625data2.163164717821436IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x5a0000x39c40x3a001e77adc716984508b1f8675d2a446dabFalse0.4030845905172414data5.363454690938261IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x5e0000x23540x2400f61d7f0f6bcc5a445f5126dff171e1c0False0.7889539930555556data6.69514422609229IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_BITMAP0x5a57c0xbb6Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/mChineseChina0.2581721147431621
                                      RT_ICON0x5b1340x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.6047297297297297
                                      RT_ICON0x5b25c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320ChineseChina0.4703757225433526
                                      RT_ICON0x5b7c40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.4986559139784946
                                      RT_ICON0x5baac0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152ChineseChina0.4444945848375451
                                      RT_DIALOG0x5c3540x176dataChineseChina0.6898395721925134
                                      RT_DIALOG0x5c4cc0xd6dataChineseChina0.6962616822429907
                                      RT_DIALOG0x5c5a40xbadataChineseChina0.7204301075268817
                                      RT_DIALOG0x5c6600x102dataChineseChina0.6201550387596899
                                      RT_DIALOG0x5c7640x286dataChineseChina0.4953560371517028
                                      RT_DIALOG0x5c9ec0x1cedataChineseChina0.6645021645021645
                                      RT_STRING0x5cbbc0xb6dataChineseChina0.7472527472527473
                                      RT_STRING0x5cc740xd6dataChineseChina0.6962616822429907
                                      RT_STRING0x5cd4c0xcadataChineseChina0.7920792079207921
                                      RT_STRING0x5ce180x76dataChineseChina0.9152542372881356
                                      RT_STRING0x5ce900x282dataChineseChina0.6417445482866043
                                      RT_STRING0x5d1140x94dataChineseChina0.777027027027027
                                      RT_STRING0x5d1a80x78dataChineseChina0.9083333333333333
                                      RT_STRING0x5d2200x64dataChineseChina0.63
                                      RT_STRING0x5d2840x52dataChineseChina0.8780487804878049
                                      RT_STRING0x5d2d80x6adataChineseChina0.7452830188679245
                                      RT_GROUP_ICON0x5d3440x3edataChineseChina0.8387096774193549
                                      RT_MANIFEST0x5d3840x640XML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.423125
                                      DLLImport
                                      KERNEL32.dllGetLastError, SetLastError, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, SetCurrentDirectoryW, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetCurrentProcess, TerminateProcess, RtlUnwind, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, HeapSize, GetConsoleCP, GetConsoleMode, SetFilePointerEx, DecodePointer
                                      Language of compilation systemCountry where language is spokenMap
                                      ChineseChina
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 4, 2024 20:25:48.079384089 CEST49675443192.168.2.4173.222.162.32
                                      May 4, 2024 20:25:49.126283884 CEST49678443192.168.2.4104.46.162.224
                                      May 4, 2024 20:25:57.688657045 CEST49675443192.168.2.4173.222.162.32
                                      May 4, 2024 20:26:10.089307070 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:10.089342117 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:10.089410067 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:10.097976923 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:10.097991943 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:10.651349068 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:10.651439905 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:10.653938055 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:10.653949976 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:10.654164076 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:10.704430103 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.208059072 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.252120018 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569032907 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569051027 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569057941 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569066048 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569087982 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569134951 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.569169044 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569190979 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.569199085 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:11.569228888 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.569274902 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.949506998 CEST49730443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:11.949546099 CEST4434973020.114.59.183192.168.2.4
                                      May 4, 2024 20:26:54.201906919 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:54.201946020 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:54.202009916 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:54.202938080 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:54.202950954 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:54.753175020 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:54.753273010 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:54.762706995 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:54.762763977 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:54.762979031 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:54.775732040 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:54.820113897 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.295838118 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.295861959 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.295876980 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.295938969 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:55.295963049 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.296022892 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.296036005 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:55.296077967 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:55.312602997 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:55.312633991 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:26:55.312663078 CEST49736443192.168.2.420.114.59.183
                                      May 4, 2024 20:26:55.312669992 CEST4434973620.114.59.183192.168.2.4
                                      May 4, 2024 20:27:08.127165079 CEST4972380192.168.2.4199.232.210.172
                                      May 4, 2024 20:27:08.127911091 CEST4972480192.168.2.4199.232.210.172
                                      May 4, 2024 20:27:08.277546883 CEST8049724199.232.210.172192.168.2.4
                                      May 4, 2024 20:27:08.277571917 CEST8049724199.232.210.172192.168.2.4
                                      May 4, 2024 20:27:08.277658939 CEST4972480192.168.2.4199.232.210.172
                                      May 4, 2024 20:27:08.277704000 CEST8049723199.232.210.172192.168.2.4
                                      May 4, 2024 20:27:08.277715921 CEST8049723199.232.210.172192.168.2.4
                                      May 4, 2024 20:27:08.277760029 CEST4972380192.168.2.4199.232.210.172
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 4, 2024 20:26:19.648261070 CEST138138192.168.2.4192.168.2.255
                                      • slscr.update.microsoft.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.44973020.114.59.183443
                                      TimestampBytes transferredDirectionData
                                      2024-05-04 18:26:11 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=okFYfBKbmACV4or&MD=d2putLvK HTTP/1.1
                                      Connection: Keep-Alive
                                      Accept: */*
                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                      Host: slscr.update.microsoft.com


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.44973020.114.59.1834436992C:\tcls\Cyber.exe
                                      TimestampBytes transferredDirectionData
                                      2024-05-04 18:26:11 UTC560INHTTP/1.1 200 OK
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Content-Type: application/octet-stream
                                      Expires: -1
                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                      MS-CorrelationId: e8faa2fa-e055-49f2-a63b-070d43084301
                                      MS-RequestId: 605c0619-8ad0-4f7e-a4ae-f992342fef4f
                                      MS-CV: koMlJoM9T06YKH+9.0
                                      X-Microsoft-SLSClientCache: 2880
                                      Content-Disposition: attachment; filename=environment.cab
                                      X-Content-Type-Options: nosniff
                                      Date: Sat, 04 May 2024 18:26:10 GMT
                                      Connection: close
                                      Content-Length: 24490
                                      2024-05-04 18:26:11 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                      2024-05-04 18:26:11 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.44973620.114.59.183443
                                      TimestampBytes transferredDirectionData
                                      2024-05-04 18:26:54 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=okFYfBKbmACV4or&MD=d2putLvK HTTP/1.1
                                      Connection: Keep-Alive
                                      Accept: */*
                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                      Host: slscr.update.microsoft.com


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.44973620.114.59.1834436992C:\tcls\Cyber.exe
                                      TimestampBytes transferredDirectionData
                                      2024-05-04 18:26:55 UTC560INHTTP/1.1 200 OK
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Content-Type: application/octet-stream
                                      Expires: -1
                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                      ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
                                      MS-CorrelationId: 0e0915a8-6f45-458d-8bec-81fa384a2f31
                                      MS-RequestId: 5411214a-43f6-40fb-b68b-4a82532b41bf
                                      MS-CV: U0YVENCwJE2pv1P+.0
                                      X-Microsoft-SLSClientCache: 2160
                                      Content-Disposition: attachment; filename=environment.cab
                                      X-Content-Type-Options: nosniff
                                      Date: Sat, 04 May 2024 18:26:54 GMT
                                      Connection: close
                                      Content-Length: 25457
                                      2024-05-04 18:26:55 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
                                      Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
                                      2024-05-04 18:26:55 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
                                      Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:20:25:51
                                      Start date:04/05/2024
                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe"
                                      Imagebase:0xb30000
                                      File size:15'256'203 bytes
                                      MD5 hash:813B31F7EE7BBDD8E42890394EA6F16F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:20:25:52
                                      Start date:04/05/2024
                                      Path:C:\tcls\Cyber.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\tcls\Cyber.exe"
                                      Imagebase:0x10000
                                      File size:5'338'624 bytes
                                      MD5 hash:E30F528038EFC32CBA51643BF67B7AF2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 79%, ReversingLabs
                                      • Detection: 58%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:false

                                      Target ID:2
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls "C:\Windows\" /grant Administrator:(OI)(CI)F
                                      Imagebase:0x420000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls "C:\Windows\" /grant Administrators:(OI)(CI)F
                                      Imagebase:0x420000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrator:(OI)(CI)F
                                      Imagebase:0x420000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:icacls "C:\Users\user\AppData\Local\Temp\" /grant Administrators:(OI)(CI)F
                                      Imagebase:0x420000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\mbrmqqboi.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\mbrmqqboi.exe 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC l
                                      Imagebase:0x400000
                                      File size:344'064 bytes
                                      MD5 hash:AE62909C8433ECDBE8289E3E1B5EC35E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 51%, ReversingLabs
                                      • Detection: 54%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:12
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\SysWOW64\sc.exe
                                      Wow64 process (32bit):true
                                      Commandline:sc.exe config Winmgmt start= AUTO
                                      Imagebase:0xa70000
                                      File size:61'440 bytes
                                      MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:13
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:14
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\mbrmqqboi.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\mbrmqqboi.exe" 573361E268EEA0A1AAD8FBFEC537B9EAF74E7373E764BF2C092E5EA54598082958EC
                                      Imagebase:0x400000
                                      File size:344'064 bytes
                                      MD5 hash:AE62909C8433ECDBE8289E3E1B5EC35E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Reputation:low
                                      Has exited:false

                                      Target ID:15
                                      Start time:20:25:55
                                      Start date:04/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:9.3%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:5.2%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:34
                                        execution_graph 20076 b3fab3 20077 b3fabb pre_c_initialization 20076->20077 20094 b48207 20077->20094 20079 b3fac6 pre_c_initialization 20101 b3f5c0 20079->20101 20081 b3fb4f 20082 b3feb8 ___scrt_fastfail 4 API calls 20081->20082 20084 b3fb56 ___scrt_initialize_default_local_stdio_options 20082->20084 20083 b3fadb __RTC_Initialize 20083->20081 20106 b3f764 20083->20106 20086 b3faf4 pre_c_initialization 20086->20081 20087 b3fb05 20086->20087 20109 b4029a InitializeSListHead 20087->20109 20089 b3fb0a pre_c_initialization ___InternalCxxFrameHandler 20110 b402a6 20089->20110 20091 b3fb2d pre_c_initialization 20116 b482a1 20091->20116 20093 b3fb38 pre_c_initialization 20095 b48216 20094->20095 20096 b48239 20094->20096 20095->20096 20097 b48846 _free 20 API calls 20095->20097 20096->20079 20098 b48229 20097->20098 20099 b48725 ___std_exception_copy 26 API calls 20098->20099 20100 b48234 20099->20100 20100->20079 20102 b3f5ce 20101->20102 20105 b3f5d3 ___scrt_initialize_onexit_tables 20101->20105 20103 b3feb8 ___scrt_fastfail 4 API calls 20102->20103 20102->20105 20104 b3f656 20103->20104 20105->20083 20123 b3f729 20106->20123 20109->20089 20189 b4837a 20110->20189 20112 b402b7 20113 b402be 20112->20113 20114 b3feb8 ___scrt_fastfail 4 API calls 20112->20114 20113->20091 20115 b402c6 20114->20115 20117 b48d26 _unexpected 38 API calls 20116->20117 20119 b482ac 20117->20119 20118 b482e4 20118->20093 20119->20118 20120 b48846 _free 20 API calls 20119->20120 20121 b482d9 20120->20121 20122 b48725 ___std_exception_copy 26 API calls 20121->20122 20122->20118 20124 b3f746 20123->20124 20125 b3f74d 20123->20125 20129 b47deb 20124->20129 20132 b47e5b 20125->20132 20128 b3f74b 20128->20086 20130 b47e5b __onexit 29 API calls 20129->20130 20131 b47dfd 20130->20131 20131->20128 20135 b47b43 20132->20135 20138 b47a79 20135->20138 20137 b47b67 20137->20128 20139 b47a85 ___FrameUnwindToState 20138->20139 20146 b4a146 EnterCriticalSection 20139->20146 20141 b47a93 20147 b47caa 20141->20147 20143 b47aa0 20157 b47abe 20143->20157 20145 b47ab1 ___FrameUnwindToState 20145->20137 20146->20141 20148 b47cc0 pre_c_initialization __crt_fast_encode_pointer 20147->20148 20149 b47cc8 20147->20149 20148->20143 20149->20148 20156 b47d21 20149->20156 20160 b4b43e 20149->20160 20150 b4b43e __onexit 29 API calls 20152 b47d37 20150->20152 20154 b48433 _free 20 API calls 20152->20154 20153 b47d17 20155 b48433 _free 20 API calls 20153->20155 20154->20148 20155->20156 20156->20148 20156->20150 20188 b4a18e LeaveCriticalSection 20157->20188 20159 b47ac8 20159->20145 20161 b4b449 20160->20161 20162 b4b471 20161->20162 20163 b4b462 20161->20163 20164 b4b480 20162->20164 20169 b4eb03 20162->20169 20165 b48846 _free 20 API calls 20163->20165 20176 b4a03d 20164->20176 20168 b4b467 ___scrt_get_show_window_mode 20165->20168 20168->20153 20170 b4eb23 HeapSize 20169->20170 20171 b4eb0e 20169->20171 20170->20164 20172 b48846 _free 20 API calls 20171->20172 20173 b4eb13 20172->20173 20174 b48725 ___std_exception_copy 26 API calls 20173->20174 20175 b4eb1e 20174->20175 20175->20164 20177 b4a055 20176->20177 20178 b4a04a 20176->20178 20180 b4a05d 20177->20180 20186 b4a066 _abort 20177->20186 20179 b4846d __onexit 21 API calls 20178->20179 20184 b4a052 20179->20184 20181 b48433 _free 20 API calls 20180->20181 20181->20184 20182 b4a090 HeapReAlloc 20182->20184 20182->20186 20183 b4a06b 20185 b48846 _free 20 API calls 20183->20185 20184->20168 20185->20184 20186->20182 20186->20183 20187 b47fdd new 7 API calls 20186->20187 20187->20186 20188->20159 20190 b48398 pre_c_initialization 20189->20190 20194 b483b8 pre_c_initialization 20189->20194 20191 b48846 _free 20 API calls 20190->20191 20192 b483ae 20191->20192 20193 b48725 ___std_exception_copy 26 API calls 20192->20193 20193->20194 20194->20112 18966 b3d8a0 18968 b3d8a5 18966->18968 18979 b3d2c7 _wcslen _wcsrchr 18966->18979 18968->18979 18991 b3e1d2 18968->18991 18969 b3de6a 18972 b3d5b4 SetWindowTextW 18972->18979 18976 b3d3a5 SetFileAttributesW 18978 b3d460 GetFileAttributesW 18976->18978 18987 b3d398 _wcslen ___scrt_get_show_window_mode 18976->18987 18981 b3d46e DeleteFileW 18978->18981 18978->18987 18979->18969 18979->18972 18983 b3d779 GetDlgItem SetWindowTextW SendMessageW 18979->18983 18986 b3d7bb SendMessageW 18979->18986 18979->18987 18990 b35644 CompareStringW 18979->18990 19014 b3bfea 18979->19014 19018 b3b63e GetCurrentDirectoryW 18979->19018 19019 b32930 18979->19019 19028 b328b9 18979->19028 19031 b3c142 18979->19031 18981->18987 18982 b32930 7 API calls 18982->18987 18983->18979 18984 b337c1 _swprintf 51 API calls 18985 b3d4a3 GetFileAttributesW 18984->18985 18985->18987 18988 b3d4b4 MoveFileW 18985->18988 18986->18979 18987->18976 18987->18978 18987->18979 18987->18982 18987->18984 19023 b33309 18987->19023 18988->18987 18989 b3d4cc MoveFileExW 18988->18989 18989->18987 18990->18979 18993 b3e1dc _wcslen ___scrt_get_show_window_mode 18991->18993 18992 b3e3f7 18992->18979 18993->18992 18994 b3e2c1 18993->18994 19040 b35644 CompareStringW 18993->19040 19037 b32578 18994->19037 18998 b3e2f5 ShellExecuteExW 18998->18992 19003 b3e308 18998->19003 19000 b3e2ed 19000->18998 19001 b3e343 19007 b3e652 3 API calls 19001->19007 19002 b3e38d CloseHandle 19004 b3e39b 19002->19004 19005 b3e3a6 19002->19005 19003->19001 19003->19002 19006 b3e33d ShowWindow 19003->19006 19049 b35644 CompareStringW 19004->19049 19005->18992 19011 b3e3f2 ShowWindow 19005->19011 19006->19001 19009 b3e35b 19007->19009 19009->19002 19010 b3e364 GetExitCodeProcess 19009->19010 19010->19002 19012 b3e377 19010->19012 19011->18992 19012->19002 19013 b3e388 19012->19013 19013->19002 19015 b3bff4 19014->19015 19016 b3c0a7 ExpandEnvironmentStringsW 19015->19016 19017 b3c0ca 19015->19017 19016->19017 19017->18979 19018->18979 19022 b3293e 19019->19022 19020 b329d1 19020->18979 19021 b329f7 7 API calls 19021->19022 19022->19020 19022->19021 19024 b33593 CharUpperW 19023->19024 19025 b3331e 19024->19025 19026 b337c1 _swprintf 51 API calls 19025->19026 19027 b33335 _wcslen 19025->19027 19026->19027 19027->18987 19029 b328c4 FindClose 19028->19029 19030 b328cb 19028->19030 19029->19030 19030->18979 19032 b3c14c new 19031->19032 19036 b3c16b _wcslen 19032->19036 19058 b319c4 19032->19058 19034 b3bfea ExpandEnvironmentStringsW 19034->19036 19035 b3c20d 19035->18979 19036->19034 19036->19035 19050 b3258c 19037->19050 19040->18994 19041 b3302e 19042 b33038 19041->19042 19043 b33054 GetFullPathNameW 19042->19043 19048 b330a3 19042->19048 19044 b33071 19043->19044 19045 b333ec 2 API calls 19044->19045 19044->19048 19046 b33084 19045->19046 19047 b33088 GetFullPathNameW 19046->19047 19046->19048 19047->19048 19048->19000 19049->19005 19051 b3f4b0 19050->19051 19052 b32599 GetFileAttributesW 19051->19052 19053 b32581 19052->19053 19054 b325aa 19052->19054 19053->18998 19053->19041 19055 b333ec 2 API calls 19054->19055 19056 b325be 19055->19056 19056->19053 19057 b325c2 GetFileAttributesW 19056->19057 19057->19053 19063 b319d7 19058->19063 19060 b319cc 19061 b31aca RaiseException 19060->19061 19062 b319d5 19061->19062 19062->19036 19066 b31b56 19063->19066 19065 b319e1 19065->19060 19067 b34f24 67 API calls 19066->19067 19068 b31b72 19067->19068 19068->19065 18832 b32398 WriteFile 18839 b3233b 18832->18839 18833 b32411 18835 b32401 18844 b31b1a 18835->18844 18837 b32359 18838 b3235e WriteFile 18837->18838 18838->18839 18839->18832 18839->18833 18839->18835 18839->18837 18839->18838 18840 b31921 18839->18840 18841 b3192a 18840->18841 18842 b31937 18840->18842 18849 b35184 18841->18849 18842->18839 18858 b31b37 18844->18858 18846 b31b2a 18847 b31aca RaiseException 18846->18847 18848 b31b33 18847->18848 18848->18833 18850 b35191 18849->18850 18851 b340a7 54 API calls 18850->18851 18852 b351a0 18851->18852 18853 b337c1 _swprintf 51 API calls 18852->18853 18854 b351b2 GetLastError 18853->18854 18855 b340a7 54 API calls 18854->18855 18856 b351c9 18855->18856 18857 b351dc SetLastError 18856->18857 18857->18842 18859 b318b9 67 API calls 18858->18859 18860 b31b49 18859->18860 18860->18846 21255 b499d2 21265 b4e257 21255->21265 21259 b499df 21278 b4e338 21259->21278 21262 b49a09 21263 b48433 _free 20 API calls 21262->21263 21264 b49a14 21263->21264 21282 b4e260 21265->21282 21267 b499da 21268 b4e10a 21267->21268 21269 b4e116 ___FrameUnwindToState 21268->21269 21302 b4a146 EnterCriticalSection 21269->21302 21271 b4e18c 21316 b4e1a1 21271->21316 21273 b4e160 DeleteCriticalSection 21276 b48433 _free 20 API calls 21273->21276 21274 b4e198 ___FrameUnwindToState 21274->21259 21277 b4e121 21276->21277 21277->21271 21277->21273 21303 b4f913 21277->21303 21279 b499ee DeleteCriticalSection 21278->21279 21280 b4e34e 21278->21280 21279->21259 21279->21262 21280->21279 21281 b48433 _free 20 API calls 21280->21281 21281->21279 21283 b4e26c ___FrameUnwindToState 21282->21283 21292 b4a146 EnterCriticalSection 21283->21292 21285 b4e30f 21297 b4e32f 21285->21297 21288 b4e31b ___FrameUnwindToState 21288->21267 21290 b4e27b 21290->21285 21291 b4e210 66 API calls 21290->21291 21293 b49a1e EnterCriticalSection 21290->21293 21294 b4e305 21290->21294 21291->21290 21292->21290 21293->21290 21300 b49a32 LeaveCriticalSection 21294->21300 21296 b4e30d 21296->21290 21301 b4a18e LeaveCriticalSection 21297->21301 21299 b4e336 21299->21288 21300->21296 21301->21299 21302->21277 21304 b4f91f ___FrameUnwindToState 21303->21304 21305 b4f945 21304->21305 21306 b4f930 21304->21306 21315 b4f940 ___FrameUnwindToState 21305->21315 21319 b49a1e EnterCriticalSection 21305->21319 21307 b48846 _free 20 API calls 21306->21307 21309 b4f935 21307->21309 21311 b48725 ___std_exception_copy 26 API calls 21309->21311 21310 b4f961 21320 b4f89d 21310->21320 21311->21315 21313 b4f96c 21336 b4f989 21313->21336 21315->21277 21579 b4a18e LeaveCriticalSection 21316->21579 21318 b4e1a8 21318->21274 21319->21310 21321 b4f8bf 21320->21321 21322 b4f8aa 21320->21322 21329 b4f8ba 21321->21329 21339 b4e1aa 21321->21339 21323 b48846 _free 20 API calls 21322->21323 21325 b4f8af 21323->21325 21327 b48725 ___std_exception_copy 26 API calls 21325->21327 21327->21329 21328 b4e338 20 API calls 21330 b4f8db 21328->21330 21329->21313 21345 b498e4 21330->21345 21332 b4f8e1 21352 b4fbdb 21332->21352 21335 b48433 _free 20 API calls 21335->21329 21578 b49a32 LeaveCriticalSection 21336->21578 21338 b4f991 21338->21315 21340 b4e1c2 21339->21340 21344 b4e1be 21339->21344 21341 b498e4 26 API calls 21340->21341 21340->21344 21342 b4e1e2 21341->21342 21367 b4f50d 21342->21367 21344->21328 21346 b49905 21345->21346 21347 b498f0 21345->21347 21346->21332 21348 b48846 _free 20 API calls 21347->21348 21349 b498f5 21348->21349 21350 b48725 ___std_exception_copy 26 API calls 21349->21350 21351 b49900 21350->21351 21351->21332 21353 b4fbff 21352->21353 21354 b4fbea 21352->21354 21355 b4fc3a 21353->21355 21359 b4fc26 21353->21359 21356 b48833 __dosmaperr 20 API calls 21354->21356 21357 b48833 __dosmaperr 20 API calls 21355->21357 21358 b4fbef 21356->21358 21360 b4fc3f 21357->21360 21361 b48846 _free 20 API calls 21358->21361 21535 b4fbb3 21359->21535 21363 b48846 _free 20 API calls 21360->21363 21364 b4f8e7 21361->21364 21365 b4fc47 21363->21365 21364->21329 21364->21335 21366 b48725 ___std_exception_copy 26 API calls 21365->21366 21366->21364 21368 b4f519 ___FrameUnwindToState 21367->21368 21369 b4f521 21368->21369 21370 b4f539 21368->21370 21392 b48833 21369->21392 21372 b4f5d7 21370->21372 21377 b4f56e 21370->21377 21374 b48833 __dosmaperr 20 API calls 21372->21374 21376 b4f5dc 21374->21376 21375 b48846 _free 20 API calls 21388 b4f52e ___FrameUnwindToState 21375->21388 21378 b48846 _free 20 API calls 21376->21378 21395 b4ba37 EnterCriticalSection 21377->21395 21380 b4f5e4 21378->21380 21382 b48725 ___std_exception_copy 26 API calls 21380->21382 21381 b4f574 21383 b4f5a5 21381->21383 21384 b4f590 21381->21384 21382->21388 21396 b4f5f8 21383->21396 21385 b48846 _free 20 API calls 21384->21385 21387 b4f595 21385->21387 21390 b48833 __dosmaperr 20 API calls 21387->21390 21388->21344 21389 b4f5a0 21447 b4f5cf 21389->21447 21390->21389 21393 b48daa _abort 20 API calls 21392->21393 21394 b48838 21393->21394 21394->21375 21395->21381 21397 b4f626 21396->21397 21435 b4f61f 21396->21435 21398 b4f649 21397->21398 21399 b4f62a 21397->21399 21403 b4f69a 21398->21403 21404 b4f67d 21398->21404 21400 b48833 __dosmaperr 20 API calls 21399->21400 21402 b4f62f 21400->21402 21401 b3fcf1 TranslatorGuardHandler 5 API calls 21405 b4f800 21401->21405 21406 b48846 _free 20 API calls 21402->21406 21407 b4f6b0 21403->21407 21450 b4f882 21403->21450 21408 b48833 __dosmaperr 20 API calls 21404->21408 21405->21389 21409 b4f636 21406->21409 21453 b4f19d 21407->21453 21412 b4f682 21408->21412 21413 b48725 ___std_exception_copy 26 API calls 21409->21413 21415 b48846 _free 20 API calls 21412->21415 21413->21435 21418 b4f68a 21415->21418 21416 b4f6f7 21419 b4f751 WriteFile 21416->21419 21420 b4f70b 21416->21420 21417 b4f6be 21421 b4f6e4 21417->21421 21422 b4f6c2 21417->21422 21423 b48725 ___std_exception_copy 26 API calls 21418->21423 21427 b4f774 GetLastError 21419->21427 21429 b4f6da 21419->21429 21424 b4f741 21420->21424 21425 b4f713 21420->21425 21465 b4ef7d GetConsoleCP 21421->21465 21426 b4f7b8 21422->21426 21460 b4f130 21422->21460 21423->21435 21491 b4f213 21424->21491 21430 b4f731 21425->21430 21431 b4f718 21425->21431 21434 b48846 _free 20 API calls 21426->21434 21426->21435 21427->21429 21429->21426 21429->21435 21438 b4f794 21429->21438 21483 b4f3e0 21430->21483 21431->21426 21476 b4f2f2 21431->21476 21437 b4f7dd 21434->21437 21435->21401 21440 b48833 __dosmaperr 20 API calls 21437->21440 21441 b4f7af 21438->21441 21442 b4f79b 21438->21442 21440->21435 21498 b48810 21441->21498 21443 b48846 _free 20 API calls 21442->21443 21445 b4f7a0 21443->21445 21446 b48833 __dosmaperr 20 API calls 21445->21446 21446->21435 21534 b4ba5a LeaveCriticalSection 21447->21534 21449 b4f5d5 21449->21388 21503 b4f804 21450->21503 21525 b4e376 21453->21525 21455 b4f1ad 21456 b4f1b2 21455->21456 21457 b48d26 _unexpected 38 API calls 21455->21457 21456->21416 21456->21417 21458 b4f1d5 21457->21458 21458->21456 21459 b4f1f3 GetConsoleMode 21458->21459 21459->21456 21462 b4f155 21460->21462 21464 b4f18a 21460->21464 21461 b4f18c GetLastError 21461->21464 21462->21461 21463 b50ce4 WriteConsoleW CreateFileW 21462->21463 21462->21464 21463->21462 21464->21429 21466 b4f0f2 21465->21466 21470 b4efe0 21465->21470 21467 b3fcf1 TranslatorGuardHandler 5 API calls 21466->21467 21469 b4f12c 21467->21469 21468 b49c84 __vswprintf_c_l 38 API calls 21468->21470 21469->21429 21470->21466 21470->21468 21471 b4f066 WideCharToMultiByte 21470->21471 21472 b4899a 40 API calls __fassign 21470->21472 21475 b4f0bd WriteFile 21470->21475 21471->21466 21473 b4f08c WriteFile 21471->21473 21472->21470 21473->21470 21474 b4f115 GetLastError 21473->21474 21474->21466 21475->21470 21475->21474 21478 b4f301 21476->21478 21477 b4f3c3 21480 b3fcf1 TranslatorGuardHandler 5 API calls 21477->21480 21478->21477 21479 b4f37f WriteFile 21478->21479 21479->21478 21481 b4f3c5 GetLastError 21479->21481 21482 b4f3dc 21480->21482 21481->21477 21482->21429 21490 b4f3ef 21483->21490 21484 b4f4fa 21485 b3fcf1 TranslatorGuardHandler 5 API calls 21484->21485 21486 b4f509 21485->21486 21486->21429 21487 b4f471 WideCharToMultiByte 21488 b4f4a6 WriteFile 21487->21488 21489 b4f4f2 GetLastError 21487->21489 21488->21489 21488->21490 21489->21484 21490->21484 21490->21487 21490->21488 21495 b4f222 21491->21495 21492 b4f2d5 21494 b3fcf1 TranslatorGuardHandler 5 API calls 21492->21494 21493 b4f294 WriteFile 21493->21495 21496 b4f2d7 GetLastError 21493->21496 21497 b4f2ee 21494->21497 21495->21492 21495->21493 21496->21492 21497->21429 21499 b48833 __dosmaperr 20 API calls 21498->21499 21500 b4881b _free 21499->21500 21501 b48846 _free 20 API calls 21500->21501 21502 b4882e 21501->21502 21502->21435 21512 b4bb0e 21503->21512 21505 b4f816 21506 b4f81e 21505->21506 21507 b4f82f SetFilePointerEx 21505->21507 21508 b48846 _free 20 API calls 21506->21508 21509 b4f823 21507->21509 21510 b4f847 GetLastError 21507->21510 21508->21509 21509->21407 21511 b48810 __dosmaperr 20 API calls 21510->21511 21511->21509 21513 b4bb1b 21512->21513 21514 b4bb30 21512->21514 21515 b48833 __dosmaperr 20 API calls 21513->21515 21516 b48833 __dosmaperr 20 API calls 21514->21516 21518 b4bb55 21514->21518 21517 b4bb20 21515->21517 21519 b4bb60 21516->21519 21520 b48846 _free 20 API calls 21517->21520 21518->21505 21521 b48846 _free 20 API calls 21519->21521 21522 b4bb28 21520->21522 21523 b4bb68 21521->21523 21522->21505 21524 b48725 ___std_exception_copy 26 API calls 21523->21524 21524->21522 21526 b4e390 21525->21526 21527 b4e383 21525->21527 21530 b4e39c 21526->21530 21531 b48846 _free 20 API calls 21526->21531 21528 b48846 _free 20 API calls 21527->21528 21529 b4e388 21528->21529 21529->21455 21530->21455 21532 b4e3bd 21531->21532 21533 b48725 ___std_exception_copy 26 API calls 21532->21533 21533->21529 21534->21449 21538 b4fb31 21535->21538 21537 b4fbd7 21537->21364 21539 b4fb3d ___FrameUnwindToState 21538->21539 21549 b4ba37 EnterCriticalSection 21539->21549 21541 b4fb4b 21542 b4fb72 21541->21542 21543 b4fb7d 21541->21543 21550 b4fc5a 21542->21550 21545 b48846 _free 20 API calls 21543->21545 21546 b4fb78 21545->21546 21565 b4fba7 21546->21565 21548 b4fb9a ___FrameUnwindToState 21548->21537 21549->21541 21551 b4bb0e 26 API calls 21550->21551 21554 b4fc6a 21551->21554 21552 b4fc70 21568 b4ba7d 21552->21568 21554->21552 21556 b4bb0e 26 API calls 21554->21556 21564 b4fca2 21554->21564 21559 b4fc99 21556->21559 21557 b4bb0e 26 API calls 21560 b4fcae CloseHandle 21557->21560 21558 b4fcea 21558->21546 21562 b4bb0e 26 API calls 21559->21562 21560->21552 21563 b4fcba GetLastError 21560->21563 21561 b48810 __dosmaperr 20 API calls 21561->21558 21562->21564 21563->21552 21564->21552 21564->21557 21577 b4ba5a LeaveCriticalSection 21565->21577 21567 b4fbb1 21567->21548 21569 b4baf3 21568->21569 21570 b4ba8c 21568->21570 21571 b48846 _free 20 API calls 21569->21571 21570->21569 21574 b4bab6 21570->21574 21572 b4baf8 21571->21572 21573 b48833 __dosmaperr 20 API calls 21572->21573 21575 b4bae3 21573->21575 21574->21575 21576 b4badd SetStdHandle 21574->21576 21575->21558 21575->21561 21576->21575 21577->21567 21578->21338 21579->21318 21592 b49bc7 21593 b49bd3 ___FrameUnwindToState 21592->21593 21604 b4a146 EnterCriticalSection 21593->21604 21595 b49bda 21605 b4b99f 21595->21605 21597 b49be9 21603 b49bf8 21597->21603 21618 b49a5b GetStartupInfoW 21597->21618 21601 b49c09 ___FrameUnwindToState 21629 b49c14 21603->21629 21604->21595 21606 b4b9ab ___FrameUnwindToState 21605->21606 21607 b4b9cf 21606->21607 21608 b4b9b8 21606->21608 21632 b4a146 EnterCriticalSection 21607->21632 21610 b48846 _free 20 API calls 21608->21610 21611 b4b9bd 21610->21611 21612 b48725 ___std_exception_copy 26 API calls 21611->21612 21613 b4b9c7 ___FrameUnwindToState 21612->21613 21613->21597 21614 b4ba07 21640 b4ba2e 21614->21640 21615 b4b9db 21615->21614 21633 b4b8f0 21615->21633 21619 b49a78 21618->21619 21621 b49b0a 21618->21621 21620 b4b99f 27 API calls 21619->21620 21619->21621 21622 b49aa1 21620->21622 21624 b49b11 21621->21624 21622->21621 21623 b49acf GetFileType 21622->21623 21623->21622 21626 b49b18 21624->21626 21625 b49b5b GetStdHandle 21625->21626 21626->21625 21627 b49bc3 21626->21627 21628 b49b6e GetFileType 21626->21628 21627->21603 21628->21626 21644 b4a18e LeaveCriticalSection 21629->21644 21631 b49c1b 21631->21601 21632->21615 21634 b484fe _abort 20 API calls 21633->21634 21635 b4b902 21634->21635 21638 b4a417 11 API calls 21635->21638 21639 b4b90f 21635->21639 21636 b48433 _free 20 API calls 21637 b4b961 21636->21637 21637->21615 21638->21635 21639->21636 21643 b4a18e LeaveCriticalSection 21640->21643 21642 b4ba35 21642->21613 21643->21642 21644->21631 19073 b3c3c5 19074 b3c3cf __EH_prolog 19073->19074 19231 b313b0 19074->19231 19077 b3c411 19083 b3c487 19077->19083 19084 b3c41e 19077->19084 19145 b3c3fd 19077->19145 19078 b3ca87 19079 b3ca9f SendMessageW 19078->19079 19080 b3caad 19078->19080 19079->19080 19081 b3cac7 19080->19081 19082 b3cab6 SendDlgItemMessageW 19080->19082 19285 b3e0dc 19081->19285 19082->19081 19086 b3c494 19083->19086 19087 b3c519 GetDlgItemTextW 19083->19087 19088 b3c423 19084->19088 19089 b3c45a 19084->19089 19092 b340a7 54 API calls 19086->19092 19087->19089 19091 b3c550 19087->19091 19093 b340a7 54 API calls 19088->19093 19088->19145 19095 b3c47b KiUserCallbackDispatcher 19089->19095 19089->19145 19096 b3c568 GetDlgItem 19091->19096 19228 b3c559 19091->19228 19097 b3c4b6 SetDlgItemTextW 19092->19097 19098 b3c43d 19093->19098 19095->19145 19100 b3c5a2 SetFocus 19096->19100 19101 b3c57c SendMessageW SendMessageW 19096->19101 19102 b3c4c4 19097->19102 19330 b312f0 SHGetMalloc 19098->19330 19099 b3caff GetDlgItem 19104 b3cb18 19099->19104 19105 b3cb1e SetWindowTextW 19099->19105 19106 b3c5b2 19100->19106 19116 b3c5be 19100->19116 19101->19100 19110 b3c4d1 GetMessageW 19102->19110 19122 b3c4f7 TranslateMessage DispatchMessageW 19102->19122 19102->19145 19104->19105 19304 b3b97d GetClassNameW 19105->19304 19111 b340a7 54 API calls 19106->19111 19108 b3ca27 19114 b340a7 54 API calls 19108->19114 19110->19102 19110->19145 19112 b3c5bc 19111->19112 19120 b3df38 11 API calls 19112->19120 19113 b3c448 SetDlgItemTextW 19113->19145 19117 b3ca37 SetDlgItemTextW 19114->19117 19123 b340a7 54 API calls 19116->19123 19119 b3ca4b 19117->19119 19129 b340a7 54 API calls 19119->19129 19124 b3c613 19120->19124 19122->19102 19128 b3c5f0 19123->19128 19237 b32447 19124->19237 19125 b3cb5f 19127 b3cb8f 19125->19127 19131 b340a7 54 API calls 19125->19131 19126 b3d273 90 API calls 19126->19125 19136 b3d273 90 API calls 19127->19136 19164 b3cc30 19127->19164 19132 b337c1 _swprintf 51 API calls 19128->19132 19133 b3ca74 19129->19133 19135 b3cb72 SetDlgItemTextW 19131->19135 19132->19112 19138 b340a7 54 API calls 19133->19138 19141 b340a7 54 API calls 19135->19141 19142 b3cbaa 19136->19142 19137 b3ccda 19143 b3cce3 EnableWindow 19137->19143 19144 b3ccec 19137->19144 19138->19145 19139 b3c64f 19243 b3b9d8 SetCurrentDirectoryW 19139->19243 19140 b3c648 GetLastError 19140->19139 19147 b3cb86 SetDlgItemTextW 19141->19147 19148 b3cbe1 19142->19148 19154 b3cbbc 19142->19154 19143->19144 19149 b3cd09 19144->19149 19350 b3136d GetDlgItem EnableWindow 19144->19350 19147->19127 19151 b3cc23 19148->19151 19167 b3cc01 DialogBoxParamW 19148->19167 19152 b3cd30 19149->19152 19161 b3cd28 SendMessageW 19149->19161 19156 b3d273 90 API calls 19151->19156 19152->19145 19162 b340a7 54 API calls 19152->19162 19153 b3c665 19157 b3c678 19153->19157 19158 b3c66e GetLastError 19153->19158 19339 b3b137 ShowWindow 19154->19339 19155 b3ccff 19351 b3136d GetDlgItem EnableWindow 19155->19351 19156->19164 19169 b3c703 19157->19169 19171 b3c690 GetTickCount 19157->19171 19208 b3c6f3 19157->19208 19158->19157 19161->19152 19166 b3cd49 SetDlgItemTextW 19162->19166 19163 b3cbd5 19163->19148 19164->19137 19165 b3ccb8 19164->19165 19172 b340a7 54 API calls 19164->19172 19168 b3b137 6 API calls 19165->19168 19166->19145 19167->19089 19167->19151 19174 b3ccd7 19168->19174 19175 b3c8cf 19169->19175 19176 b3c71d GetModuleFileNameW 19169->19176 19170 b3c92a 19252 b3138b GetDlgItem ShowWindow 19170->19252 19177 b337c1 _swprintf 51 API calls 19171->19177 19172->19164 19174->19137 19180 b340a7 54 API calls 19175->19180 19332 b3416a 19176->19332 19185 b3c6ad 19177->19185 19178 b3c93a 19253 b3138b GetDlgItem ShowWindow 19178->19253 19183 b3c8d9 19180->19183 19184 b337c1 _swprintf 51 API calls 19183->19184 19189 b3c8f7 19184->19189 19244 b31cd2 19185->19244 19186 b3c944 19191 b340a7 54 API calls 19186->19191 19187 b337c1 _swprintf 51 API calls 19188 b3c770 CreateFileMappingW 19187->19188 19192 b3c7ce GetCommandLineW 19188->19192 19221 b3c834 __vswprintf_c_l 19188->19221 19201 b340a7 54 API calls 19189->19201 19194 b3c94e SetDlgItemTextW 19191->19194 19195 b3c7df 19192->19195 19193 b3c6d3 19196 b3c6e1 19193->19196 19197 b3c6da GetLastError 19193->19197 19254 b3138b GetDlgItem ShowWindow 19194->19254 19336 b3c0e2 SHGetMalloc 19195->19336 19203 b31be1 73 API calls 19196->19203 19197->19196 19198 b3c83f ShellExecuteExW 19222 b3c85c 19198->19222 19200 b3c962 SetDlgItemTextW GetDlgItem 19204 b3c993 19200->19204 19205 b3c97b GetWindowLongW SetWindowLongW 19200->19205 19206 b3c911 19201->19206 19203->19208 19255 b3d273 19204->19255 19205->19204 19208->19169 19208->19170 19210 b3c0e2 SHGetMalloc 19212 b3c807 19210->19212 19215 b3c0e2 SHGetMalloc 19212->19215 19213 b3c89f 19219 b3c8c5 19213->19219 19220 b3c8b5 UnmapViewOfFile CloseHandle 19213->19220 19214 b3d273 90 API calls 19216 b3c9af 19214->19216 19217 b3c813 MapViewOfFile 19215->19217 19279 b3e463 19216->19279 19217->19221 19219->19089 19219->19175 19220->19219 19221->19198 19222->19213 19224 b3c88b Sleep 19222->19224 19224->19213 19224->19222 19225 b3d273 90 API calls 19229 b3c9d5 19225->19229 19226 b3c9fe 19338 b3136d GetDlgItem EnableWindow 19226->19338 19228->19089 19228->19108 19229->19226 19230 b3d273 90 API calls 19229->19230 19230->19226 19232 b313b9 19231->19232 19233 b313dd 19231->19233 19234 b313db 19232->19234 19352 b33e2e 19232->19352 19371 b33e04 19233->19371 19234->19077 19234->19078 19234->19145 19240 b32451 19237->19240 19238 b3250b 19238->19139 19238->19140 19239 b324e2 19239->19238 19377 b3260d 19239->19377 19240->19238 19240->19239 19242 b3260d 9 API calls 19240->19242 19242->19240 19243->19153 19245 b31cdc 19244->19245 19246 b31d59 19245->19246 19247 b31d3a CreateFileW 19245->19247 19248 b31d98 19246->19248 19249 b333ec 2 API calls 19246->19249 19247->19246 19248->19193 19250 b31d7d 19249->19250 19250->19248 19251 b31d81 CreateFileW 19250->19251 19251->19248 19252->19178 19253->19186 19254->19200 19256 b3d27d __EH_prolog 19255->19256 19257 b3c9a1 19256->19257 19258 b3bfea ExpandEnvironmentStringsW 19256->19258 19257->19214 19271 b3d2b4 _wcslen _wcsrchr 19258->19271 19260 b3bfea ExpandEnvironmentStringsW 19260->19271 19261 b3d5b4 SetWindowTextW 19261->19271 19263 b3c142 69 API calls 19263->19271 19264 b32930 7 API calls 19264->19271 19265 b3d3a5 SetFileAttributesW 19267 b3d460 GetFileAttributesW 19265->19267 19275 b3d398 _wcslen ___scrt_get_show_window_mode 19265->19275 19266 b328b9 FindClose 19266->19271 19269 b3d46e DeleteFileW 19267->19269 19267->19275 19268 b33309 52 API calls 19268->19275 19269->19275 19270 b32930 7 API calls 19270->19275 19271->19257 19271->19260 19271->19261 19271->19263 19271->19264 19271->19266 19272 b3d779 GetDlgItem SetWindowTextW SendMessageW 19271->19272 19271->19275 19276 b3d7bb SendMessageW 19271->19276 19398 b35644 CompareStringW 19271->19398 19399 b3b63e GetCurrentDirectoryW 19271->19399 19272->19271 19273 b337c1 _swprintf 51 API calls 19274 b3d4a3 GetFileAttributesW 19273->19274 19274->19275 19277 b3d4b4 MoveFileW 19274->19277 19275->19265 19275->19267 19275->19268 19275->19270 19275->19271 19275->19273 19276->19271 19277->19275 19278 b3d4cc MoveFileExW 19277->19278 19278->19275 19280 b3e46d __EH_prolog 19279->19280 19400 b3468a 19280->19400 19282 b3e494 19404 b3a446 19282->19404 19284 b3c9c0 19284->19225 19286 b3e0e9 19285->19286 19960 b3b599 19286->19960 19289 b3e0f6 GetWindow 19290 b3cacd GetDlgItem SendMessageW 19289->19290 19293 b3e112 19289->19293 19303 b3b63e GetCurrentDirectoryW 19290->19303 19291 b3e11f GetClassNameW 19965 b35644 CompareStringW 19291->19965 19293->19290 19293->19291 19294 b3e1b0 GetWindow 19293->19294 19295 b3e147 GetWindowLongW 19293->19295 19294->19290 19294->19293 19295->19294 19296 b3e157 SendMessageW 19295->19296 19296->19294 19298 b3e16d 19296->19298 19966 b3b5fb 19298->19966 19970 b3b5b8 19298->19970 19974 b3b6a8 19298->19974 19302 b3e1a9 DeleteObject 19302->19294 19303->19099 19305 b3b9c3 19304->19305 19306 b3b99e 19304->19306 19308 b3b9d1 19305->19308 19309 b3b9c8 SHAutoComplete 19305->19309 19986 b35644 CompareStringW 19306->19986 19312 b3bd46 19308->19312 19309->19308 19310 b3b9b1 19310->19305 19311 b3b9b5 FindWindowExW 19310->19311 19311->19305 19313 b3bd50 __EH_prolog 19312->19313 19314 b31f07 6 API calls 19313->19314 19317 b3bd7a new 19314->19317 19315 b31be1 73 API calls 19316 b3be84 19315->19316 19316->19125 19316->19126 19318 b3217b 70 API calls 19317->19318 19327 b3be24 19317->19327 19319 b3bda9 19318->19319 19320 b32286 70 API calls 19319->19320 19321 b3bdb4 19320->19321 19322 b3217b 70 API calls 19321->19322 19323 b3bdd5 19322->19323 19324 b320a8 73 API calls 19323->19324 19325 b3bde2 19324->19325 19326 b31c84 69 API calls 19325->19326 19328 b3bdef new 19326->19328 19327->19315 19328->19327 19329 b35386 MultiByteToWideChar 19328->19329 19329->19327 19331 b31307 19330->19331 19331->19113 19331->19145 19333 b34173 19332->19333 19335 b3418c 19332->19335 19334 b341e1 72 API calls 19333->19334 19333->19335 19334->19335 19335->19187 19337 b3c104 19336->19337 19337->19210 19338->19228 19987 b3ae97 19339->19987 19342 b3b189 19343 b3b223 19342->19343 19346 b3b1eb 19342->19346 19344 b3b227 ShowWindow 19343->19344 19345 b3b220 19343->19345 19344->19345 19345->19163 19346->19345 19989 b3af4d 19346->19989 19349 b3b209 ShowWindow SetWindowTextW 19349->19345 19350->19155 19351->19149 19374 b337f3 19352->19374 19354 b33e54 GetWindowRect GetClientRect 19355 b33f57 19354->19355 19359 b33eae 19354->19359 19356 b33f61 GetWindowTextW 19355->19356 19357 b33f99 GetSystemMetrics GetWindow 19355->19357 19358 b33884 52 API calls 19356->19358 19362 b33fb9 19357->19362 19363 b33f8d SetWindowTextW 19358->19363 19359->19357 19360 b33f18 GetWindowLongW 19359->19360 19364 b33f2d GetWindowRect 19360->19364 19361 b3409a 19361->19234 19362->19361 19365 b33fc5 GetWindowTextW 19362->19365 19366 b34080 GetWindow 19362->19366 19367 b3400b GetWindowRect 19362->19367 19369 b33884 52 API calls 19362->19369 19363->19357 19364->19355 19365->19362 19366->19361 19366->19362 19367->19366 19370 b33ff8 SetWindowTextW 19369->19370 19370->19362 19372 b33e0a GetWindowLongW SetWindowLongW 19371->19372 19373 b33e28 19371->19373 19372->19373 19373->19234 19375 b33884 52 API calls 19374->19375 19376 b3381b 19375->19376 19376->19354 19378 b3261a 19377->19378 19379 b3263e 19378->19379 19380 b32631 CreateDirectoryW 19378->19380 19381 b32578 4 API calls 19379->19381 19380->19379 19382 b32671 19380->19382 19383 b32644 19381->19383 19386 b32680 19382->19386 19390 b3284a 19382->19390 19384 b32684 GetLastError 19383->19384 19387 b333ec 2 API calls 19383->19387 19384->19386 19386->19238 19388 b3265a 19387->19388 19388->19384 19389 b3265e CreateDirectoryW 19388->19389 19389->19382 19389->19384 19391 b3f4b0 19390->19391 19392 b32857 SetFileAttributesW 19391->19392 19393 b3289a 19392->19393 19394 b3286d 19392->19394 19393->19386 19395 b333ec 2 API calls 19394->19395 19396 b32881 19395->19396 19396->19393 19397 b32885 SetFileAttributesW 19396->19397 19397->19393 19398->19271 19399->19271 19401 b34697 _wcslen 19400->19401 19408 b34614 19401->19408 19403 b346af 19403->19282 19405 b3a450 __EH_prolog ___scrt_get_show_window_mode 19404->19405 19416 b39e11 19405->19416 19407 b3a475 19407->19284 19409 b34626 19408->19409 19414 b3467e 19408->19414 19410 b3464f 19409->19410 19411 b3198c 67 API calls 19409->19411 19410->19414 19415 b319c4 68 API calls 19410->19415 19412 b34645 19411->19412 19413 b319c4 68 API calls 19412->19413 19413->19410 19414->19403 19415->19414 19421 b38f82 19416->19421 19418 b39e19 19420 b39e22 19418->19420 19426 b38fd2 19418->19426 19420->19407 19422 b38f8c new 19421->19422 19423 b319d7 67 API calls 19422->19423 19424 b38fb6 19422->19424 19425 b38fce 19423->19425 19424->19418 19425->19418 19429 b38fdc 19426->19429 19430 b39053 19429->19430 19443 b3587a 19429->19443 19448 b328cc 19429->19448 19454 b398f0 19430->19454 19432 b39064 19433 b39079 19432->19433 19468 b319ec 19432->19468 19437 b3908b 19433->19437 19471 b31901 19433->19471 19436 b390c7 19436->19420 19437->19436 19474 b35903 19437->19474 19524 b3583f 19443->19524 19446 b337c1 _swprintf 51 API calls 19447 b358c8 19446->19447 19447->19429 19449 b328e1 19448->19449 19450 b328e5 19449->19450 19531 b329f7 19449->19531 19450->19429 19452 b328f5 19452->19450 19453 b328fa FindClose 19452->19453 19453->19450 19455 b398fa 19454->19455 19456 b328cc 8 API calls 19455->19456 19457 b39918 19456->19457 19466 b39939 19457->19466 19543 b37438 19457->19543 19459 b39935 19459->19466 19549 b3936d 19459->19549 19466->19432 19469 b318b9 67 API calls 19468->19469 19470 b319fe 19469->19470 19470->19433 19472 b3188e 67 API calls 19471->19472 19473 b3190f 19472->19473 19473->19437 19475 b35911 __EH_prolog 19474->19475 19649 b356c7 19475->19649 19478 b37568 78 API calls 19522 b3594d ___InternalCxxFrameHandler __allrem 19478->19522 19480 b36624 19481 b366a1 19480->19481 19731 b326b1 19480->19731 19484 b3719b 82 API calls 19484->19522 19486 b37917 78 API calls 19486->19522 19488 b37438 68 API calls 19488->19522 19489 b3587a 53 API calls 19489->19522 19490 b3583f CompareStringW CompareStringW 19490->19522 19491 b35365 65 API calls 19491->19522 19492 b318b9 67 API calls 19492->19522 19494 b31901 67 API calls 19494->19522 19497 b35a9f 19503 b33251 2 API calls 19503->19522 19513 b36626 19514 b32578 4 API calls 19514->19522 19516 b34db7 7 API calls 19516->19522 19517 b3188e 67 API calls 19517->19522 19518 b3260d 9 API calls 19518->19522 19520 b3468a 68 API calls 19520->19522 19521 b32447 9 API calls 19521->19522 19522->19478 19522->19480 19522->19484 19522->19486 19522->19488 19522->19489 19522->19490 19522->19491 19522->19492 19522->19494 19522->19497 19522->19503 19522->19513 19522->19514 19522->19516 19522->19517 19522->19518 19522->19520 19522->19521 19523 b358e0 68 API calls 19522->19523 19652 b35825 19522->19652 19656 b39b5e 19522->19656 19672 b39cd5 19522->19672 19675 b36ff6 19522->19675 19679 b351f3 19522->19679 19692 b3a2c7 19522->19692 19695 b3678b 19522->19695 19523->19522 19525 b35849 19524->19525 19526 b3586b 19525->19526 19530 b35644 CompareStringW 19525->19530 19526->19446 19528 b3585a 19528->19526 19529 b35666 CompareStringW 19528->19529 19529->19526 19530->19528 19532 b32a01 19531->19532 19533 b32a91 FindNextFileW 19532->19533 19534 b32a1f FindFirstFileW 19532->19534 19535 b32ab0 19533->19535 19536 b32a9c GetLastError 19533->19536 19537 b32a38 19534->19537 19542 b32a75 19534->19542 19535->19542 19536->19535 19538 b333ec 2 API calls 19537->19538 19539 b32a51 19538->19539 19540 b32a55 FindFirstFileW 19539->19540 19541 b32a6a GetLastError 19539->19541 19540->19541 19540->19542 19541->19542 19542->19452 19544 b37442 __EH_prolog 19543->19544 19574 b3fa72 19544->19574 19546 b3744d 19547 b37497 19546->19547 19580 b31a0b 19546->19580 19547->19459 19550 b39391 19549->19550 19552 b39425 __allrem 19549->19552 19551 b3939b 19550->19551 19550->19552 19591 b37917 19551->19591 19554 b37917 78 API calls 19552->19554 19558 b39481 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z _strncpy 19552->19558 19554->19558 19577 b3fa77 new 19574->19577 19575 b3faa3 19575->19546 19576 b47fdd new 7 API calls 19576->19577 19577->19575 19577->19576 19583 b401cb 19577->19583 19587 b401ae 19577->19587 19581 b319ec 67 API calls 19580->19581 19582 b31a16 19581->19582 19582->19547 19584 b401d9 new 19583->19584 19585 b409b0 __CxxThrowException@8 RaiseException 19584->19585 19586 b401e7 19585->19586 19586->19577 19588 b401bc Concurrency::cancel_current_task 19587->19588 19589 b409b0 __CxxThrowException@8 RaiseException 19588->19589 19590 b401ca 19589->19590 19754 b35737 19649->19754 19653 b35837 19652->19653 19654 b3582e 19652->19654 19653->19522 19657 b37568 78 API calls 19656->19657 19673 b37568 78 API calls 19672->19673 19676 b37003 19675->19676 19681 b351fd 19679->19681 19755 b35749 19754->19755 19760 b356e0 19754->19760 19756 b35772 19755->19756 19757 b3198c 67 API calls 19755->19757 19756->19760 19761 b319c4 68 API calls 19756->19761 19758 b35768 19757->19758 19760->19522 19761->19760 19961 b3b5b8 3 API calls 19960->19961 19962 b3b5a0 19961->19962 19963 b3b5ac 19962->19963 19964 b3b5fb 3 API calls 19962->19964 19963->19289 19963->19290 19964->19963 19965->19293 19967 b3b604 GetDC 19966->19967 19968 b3b62a 19966->19968 19967->19968 19969 b3b613 GetDeviceCaps ReleaseDC 19967->19969 19968->19298 19969->19968 19971 b3b5c1 GetDC 19970->19971 19972 b3b5e7 19970->19972 19971->19972 19973 b3b5d0 GetDeviceCaps ReleaseDC 19971->19973 19972->19298 19973->19972 19982 b3b655 GetDC GetDeviceCaps ReleaseDC 19974->19982 19976 b3b6b0 19977 b3b6b4 19976->19977 19979 b3b6ca ___scrt_get_show_window_mode 19976->19979 19983 b3b89f GetDC 19977->19983 19980 b3b6c5 SendMessageW 19979->19980 19981 b3b85e DeleteObject 19979->19981 19980->19294 19980->19302 19981->19980 19982->19976 19984 b3b8bd ReleaseDC 19983->19984 19984->19980 19986->19310 19988 b3aed4 GetWindowRect 19987->19988 19988->19342 19991 b3af5f _wcslen new 19989->19991 19990 b3b109 19990->19345 19990->19349 19991->19990 19992 b35666 CompareStringW 19991->19992 19992->19991 20000 b359ca 20001 b37568 78 API calls 20000->20001 20025 b35981 ___InternalCxxFrameHandler __allrem 20001->20025 20002 b3719b 82 API calls 20002->20025 20003 b39b5e 78 API calls 20003->20025 20004 b37917 78 API calls 20004->20025 20005 b3587a 53 API calls 20005->20025 20006 b3583f CompareStringW CompareStringW 20006->20025 20007 b35365 65 API calls 20007->20025 20008 b318b9 67 API calls 20008->20025 20009 b37438 68 API calls 20009->20025 20010 b36648 20011 b326b1 10 API calls 20010->20011 20013 b36624 20011->20013 20012 b35825 68 API calls 20012->20025 20013->20010 20014 b366a1 20013->20014 20019 b366c9 20014->20019 20020 b31901 67 API calls 20014->20020 20015 b31901 67 API calls 20015->20025 20016 b35aea 20018 b34db7 7 API calls 20016->20018 20017 b35a9f 20017->20016 20026 b33251 2 API calls 20017->20026 20022 b35b18 20018->20022 20021 b3188e 67 API calls 20019->20021 20024 b36700 20019->20024 20020->20019 20021->20024 20028 b318b9 67 API calls 20022->20028 20029 b35b6c ___scrt_get_show_window_mode 20022->20029 20023 b39cd5 78 API calls 20023->20025 20025->20000 20025->20002 20025->20003 20025->20004 20025->20005 20025->20006 20025->20007 20025->20008 20025->20009 20025->20012 20025->20013 20025->20015 20025->20017 20025->20023 20027 b37568 78 API calls 20025->20027 20033 b33251 2 API calls 20025->20033 20037 b36ff6 8 API calls 20025->20037 20038 b3a2c7 85 API calls 20025->20038 20039 b3678b 98 API calls 20025->20039 20040 b36626 20025->20040 20041 b32578 4 API calls 20025->20041 20043 b34db7 7 API calls 20025->20043 20044 b3188e 67 API calls 20025->20044 20045 b351f3 8 API calls 20025->20045 20046 b3468a 68 API calls 20025->20046 20047 b32447 9 API calls 20025->20047 20048 b3260d 9 API calls 20025->20048 20049 b358e0 68 API calls 20025->20049 20026->20016 20027->20025 20028->20029 20030 b31643 3 API calls 20029->20030 20032 b35c45 20029->20032 20031 b35c24 20030->20031 20031->20032 20034 b36e2b 67 API calls 20031->20034 20033->20025 20035 b35c31 20034->20035 20035->20032 20036 b3468a 68 API calls 20035->20036 20036->20032 20037->20025 20038->20025 20039->20025 20042 b31b56 67 API calls 20040->20042 20041->20025 20042->20013 20043->20025 20044->20025 20045->20025 20046->20025 20047->20025 20048->20025 20049->20025 20050 b48e2f 20058 b4a2bc 20050->20058 20053 b48daa _abort 20 API calls 20054 b48e4b 20053->20054 20055 b48e58 20054->20055 20065 b48e5b 20054->20065 20057 b48e43 20059 b4a1a5 _abort 5 API calls 20058->20059 20060 b4a2e3 20059->20060 20061 b4a2fb TlsAlloc 20060->20061 20062 b4a2ec 20060->20062 20061->20062 20063 b3fcf1 TranslatorGuardHandler 5 API calls 20062->20063 20064 b48e39 20063->20064 20064->20053 20064->20057 20066 b48e65 20065->20066 20067 b48e6b 20065->20067 20069 b4a312 20066->20069 20067->20057 20070 b4a1a5 _abort 5 API calls 20069->20070 20071 b4a339 20070->20071 20072 b4a351 TlsFree 20071->20072 20073 b4a345 20071->20073 20072->20073 20074 b3fcf1 TranslatorGuardHandler 5 API calls 20073->20074 20075 b4a362 20074->20075 20075->20067 20819 b48c11 20820 b48c1c 20819->20820 20821 b48c2c 20819->20821 20825 b48c32 20820->20825 20824 b48433 _free 20 API calls 20824->20821 20826 b48c45 20825->20826 20827 b48c4b 20825->20827 20828 b48433 _free 20 API calls 20826->20828 20829 b48433 _free 20 API calls 20827->20829 20828->20827 20830 b48c57 20829->20830 20831 b48433 _free 20 API calls 20830->20831 20832 b48c62 20831->20832 20833 b48433 _free 20 API calls 20832->20833 20834 b48c6d 20833->20834 20835 b48433 _free 20 API calls 20834->20835 20836 b48c78 20835->20836 20837 b48433 _free 20 API calls 20836->20837 20838 b48c83 20837->20838 20839 b48433 _free 20 API calls 20838->20839 20840 b48c8e 20839->20840 20841 b48433 _free 20 API calls 20840->20841 20842 b48c99 20841->20842 20843 b48433 _free 20 API calls 20842->20843 20844 b48ca4 20843->20844 20845 b48433 _free 20 API calls 20844->20845 20846 b48cb2 20845->20846 20851 b48af8 20846->20851 20857 b48a04 20851->20857 20853 b48b1c 20854 b48b48 20853->20854 20870 b48a65 20854->20870 20856 b48b6c 20856->20824 20858 b48a10 ___FrameUnwindToState 20857->20858 20865 b4a146 EnterCriticalSection 20858->20865 20860 b48a44 20866 b48a59 20860->20866 20862 b48a1a 20862->20860 20864 b48433 _free 20 API calls 20862->20864 20863 b48a51 ___FrameUnwindToState 20863->20853 20864->20860 20865->20862 20869 b4a18e LeaveCriticalSection 20866->20869 20868 b48a63 20868->20863 20869->20868 20871 b48a71 ___FrameUnwindToState 20870->20871 20878 b4a146 EnterCriticalSection 20871->20878 20873 b48a7b 20874 b48cdb _abort 20 API calls 20873->20874 20875 b48a8e 20874->20875 20879 b48aa4 20875->20879 20877 b48a9c ___FrameUnwindToState 20877->20856 20878->20873 20882 b4a18e LeaveCriticalSection 20879->20882 20881 b48aae 20881->20877 20882->20881 18872 b3ef02 18873 b3eed3 18872->18873 18875 b3f1fe 18873->18875 18903 b3ef0c 18875->18903 18877 b3f218 18878 b3f275 18877->18878 18891 b3f299 18877->18891 18914 b3f17c 18878->18914 18881 b3f46e 18882 b3fcf1 TranslatorGuardHandler 5 API calls 18881->18882 18884 b3f47d 18882->18884 18883 b3f311 LoadLibraryExA 18885 b3f372 18883->18885 18886 b3f324 GetLastError 18883->18886 18884->18873 18890 b3f384 18885->18890 18892 b3f37d FreeLibrary 18885->18892 18887 b3f337 18886->18887 18888 b3f34d 18886->18888 18887->18885 18887->18888 18893 b3f17c DloadReleaseSectionWriteAccess 11 API calls 18888->18893 18889 b3f3e2 GetProcAddress 18894 b3f3f2 GetLastError 18889->18894 18899 b3f440 18889->18899 18890->18889 18890->18899 18891->18883 18891->18885 18891->18890 18891->18899 18892->18890 18895 b3f358 RaiseException 18893->18895 18896 b3f405 18894->18896 18895->18881 18898 b3f17c DloadReleaseSectionWriteAccess 11 API calls 18896->18898 18896->18899 18897 b3f17c DloadReleaseSectionWriteAccess 11 API calls 18897->18881 18900 b3f426 RaiseException 18898->18900 18899->18897 18901 b3ef0c ___delayLoadHelper2@8 11 API calls 18900->18901 18902 b3f43d 18901->18902 18902->18899 18904 b3ef18 18903->18904 18905 b3ef3e 18903->18905 18922 b3efba 18904->18922 18905->18877 18908 b3ef39 18932 b3ef3f 18908->18932 18911 b3fcf1 TranslatorGuardHandler 5 API calls 18912 b3f1fa 18911->18912 18912->18877 18913 b3f1c9 18913->18911 18915 b3f1b0 RaiseException 18914->18915 18916 b3f18e 18914->18916 18915->18881 18917 b3efba DloadLock 8 API calls 18916->18917 18918 b3f193 18917->18918 18919 b3f1ab 18918->18919 18920 b3f10c DloadProtectSection 3 API calls 18918->18920 18944 b3f1b4 18919->18944 18920->18919 18923 b3ef3f DloadUnlock 3 API calls 18922->18923 18924 b3efcf 18923->18924 18925 b3fcf1 TranslatorGuardHandler 5 API calls 18924->18925 18926 b3ef1d 18925->18926 18926->18908 18927 b3f10c 18926->18927 18930 b3f121 DloadObtainSection 18927->18930 18928 b3f127 18928->18908 18929 b3f15c VirtualProtect 18929->18928 18930->18928 18930->18929 18940 b3f017 VirtualQuery 18930->18940 18933 b3ef50 18932->18933 18934 b3ef4c 18932->18934 18935 b3ef54 18933->18935 18936 b3ef58 GetModuleHandleW 18933->18936 18934->18913 18935->18913 18937 b3ef6e GetProcAddress 18936->18937 18939 b3ef6a 18936->18939 18938 b3ef7e GetProcAddress 18937->18938 18937->18939 18938->18939 18939->18913 18941 b3f032 18940->18941 18942 b3f03d GetSystemInfo 18941->18942 18943 b3f075 18941->18943 18942->18943 18943->18929 18945 b3ef3f DloadUnlock 3 API calls 18944->18945 18946 b3f1c9 18945->18946 18947 b3fcf1 TranslatorGuardHandler 5 API calls 18946->18947 18948 b3f1fa 18947->18948 18948->18915 18949 b4a105 18950 b4a110 18949->18950 18952 b4a139 18950->18952 18954 b4a135 18950->18954 18955 b4a417 18950->18955 18962 b4a15d 18952->18962 18956 b4a1a5 _abort 5 API calls 18955->18956 18957 b4a43e 18956->18957 18958 b4a447 18957->18958 18959 b4a45c InitializeCriticalSectionAndSpinCount 18957->18959 18960 b3fcf1 TranslatorGuardHandler 5 API calls 18958->18960 18959->18958 18961 b4a473 18960->18961 18961->18950 18963 b4a189 18962->18963 18964 b4a16a 18962->18964 18963->18954 18965 b4a174 DeleteCriticalSection 18964->18965 18965->18963 18965->18965 17503 b3fb71 17504 b3fb7d ___FrameUnwindToState 17503->17504 17533 b3f587 17504->17533 17506 b3fb84 17508 b3fbad 17506->17508 17611 b3feb8 IsProcessorFeaturePresent 17506->17611 17516 b3fbec ___scrt_release_startup_lock 17508->17516 17615 b481c2 17508->17615 17512 b3fbcc ___FrameUnwindToState 17513 b3fc4c 17544 b43144 17513->17544 17516->17513 17623 b47527 17516->17623 17534 b3f590 17533->17534 17638 b3fd07 IsProcessorFeaturePresent 17534->17638 17538 b3f5a1 17539 b3f5a5 17538->17539 17652 b47fa4 17538->17652 17539->17506 17542 b3f5bc 17542->17506 17763 b4310a GetModuleFileNameW 17544->17763 17546 b431ce 17547 b3fcf1 TranslatorGuardHandler 5 API calls 17546->17547 17548 b3fc53 17547->17548 17551 b3ffd3 17548->17551 17549 b4316c 17549->17546 17767 b311d7 17549->17767 17773 b40480 17551->17773 17554 b3fc59 17555 b48113 17554->17555 17775 b4afc8 17555->17775 17557 b3fc62 17560 b3e8de 17557->17560 17558 b4811c 17558->17557 17779 b4b353 17558->17779 18363 b347f4 17560->18363 17564 b3e901 ___scrt_get_show_window_mode 17565 b3e911 GetCommandLineW 17564->17565 17566 b3e992 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 17565->17566 17567 b3e920 17565->17567 18427 b337c1 17566->18427 18414 b3d104 17567->18414 17573 b3e92f OpenFileMappingW 17577 b3e983 CloseHandle 17573->17577 17578 b3e947 MapViewOfFile 17573->17578 17574 b3e98c 18421 b3e5c3 17574->18421 17576 b3ea49 18434 b33a07 17576->18434 17577->17566 17580 b3e97c UnmapViewOfFile 17578->17580 17581 b3e95c __vswprintf_c_l 17578->17581 17580->17577 17582 b3e5c3 2 API calls 17581->17582 17582->17580 17583 b3ea54 17584 b3ea66 DialogBoxParamW 17583->17584 17585 b3eaa0 17584->17585 18439 b3ba31 17585->18439 17587 b3eab2 17612 b3fece ___scrt_get_show_window_mode 17611->17612 17613 b3ff76 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17612->17613 17614 b3ffc0 17613->17614 17614->17506 17616 b481d9 17615->17616 17617 b3fcf1 TranslatorGuardHandler 5 API calls 17616->17617 17618 b3fbc6 17617->17618 17618->17512 17619 b48166 17618->17619 17620 b48195 17619->17620 17621 b3fcf1 TranslatorGuardHandler 5 API calls 17620->17621 17622 b481be 17621->17622 17622->17516 17624 b4754f pre_c_initialization _unexpected 17623->17624 17624->17513 17625 b48d26 _unexpected 38 API calls 17624->17625 17626 b4834f 17625->17626 17627 b484bb _abort 38 API calls 17626->17627 17628 b48379 17627->17628 17639 b3f59c 17638->17639 17640 b42f14 17639->17640 17641 b42f19 ___vcrt_initialize_pure_virtual_call_handler 17640->17641 17664 b4424a 17641->17664 17645 b42f2f 17646 b42f33 17645->17646 17647 b42f3a 17645->17647 17681 b44286 17646->17681 17678 b4327c 17647->17678 17650 b42f27 17650->17538 17738 b4b4d1 17652->17738 17655 b42f42 17750 b4328f 17655->17750 17658 b42f61 17658->17539 17659 b43448 ___vcrt_uninitialize_ptd 6 API calls 17660 b42f55 17659->17660 17661 b44286 ___vcrt_uninitialize_locks DeleteCriticalSection 17660->17661 17662 b42f5a 17661->17662 17753 b4464e 17662->17753 17666 b44253 17664->17666 17667 b4427c 17666->17667 17668 b42f23 17666->17668 17685 b445e4 17666->17685 17669 b44286 ___vcrt_uninitialize_locks DeleteCriticalSection 17667->17669 17668->17650 17670 b43415 17668->17670 17669->17668 17704 b444f9 17670->17704 17672 b4341f 17673 b4342a 17672->17673 17709 b445a7 17672->17709 17673->17645 17675 b43438 17676 b43445 17675->17676 17714 b43448 17675->17714 17676->17645 17723 b31000 17678->17723 17682 b442b0 17681->17682 17683 b44291 17681->17683 17682->17650 17684 b4429b DeleteCriticalSection 17683->17684 17684->17682 17684->17684 17690 b442d2 17685->17690 17688 b4461b InitializeCriticalSectionAndSpinCount 17689 b44607 17688->17689 17689->17666 17691 b44306 17690->17691 17692 b44302 17690->17692 17691->17688 17691->17689 17692->17691 17693 b44326 17692->17693 17697 b44372 17692->17697 17693->17691 17695 b44332 GetProcAddress 17693->17695 17696 b44342 __crt_fast_encode_pointer 17695->17696 17696->17691 17698 b4438f 17697->17698 17699 b4439a LoadLibraryExW 17697->17699 17698->17692 17700 b443b6 GetLastError 17699->17700 17701 b443ce 17699->17701 17700->17701 17703 b443c1 LoadLibraryExW 17700->17703 17701->17698 17702 b443e5 FreeLibrary 17701->17702 17702->17698 17703->17701 17705 b442d2 try_get_function 5 API calls 17704->17705 17706 b44513 17705->17706 17707 b4452b TlsAlloc 17706->17707 17708 b4451c 17706->17708 17708->17672 17710 b442d2 try_get_function 5 API calls 17709->17710 17711 b445c1 17710->17711 17712 b445db TlsSetValue 17711->17712 17713 b445d0 17711->17713 17712->17713 17713->17675 17715 b43452 17714->17715 17717 b43458 17714->17717 17718 b44533 17715->17718 17717->17673 17719 b442d2 try_get_function 5 API calls 17718->17719 17720 b4454d 17719->17720 17721 b44564 TlsFree 17720->17721 17722 b44559 17720->17722 17721->17722 17722->17717 17724 b3100f 17723->17724 17729 b443f3 17724->17729 17726 b3102e 17728 b31037 17726->17728 17732 b3105d 17726->17732 17728->17538 17730 b442d2 try_get_function 5 API calls 17729->17730 17731 b4440d 17730->17731 17731->17726 17735 b44433 17732->17735 17734 b31077 17734->17728 17736 b442d2 try_get_function 5 API calls 17735->17736 17737 b4444d 17736->17737 17737->17734 17741 b4b4ea 17738->17741 17740 b3f5ae 17740->17542 17740->17655 17742 b3fcf1 17741->17742 17743 b3fcfa 17742->17743 17744 b3fcfc IsProcessorFeaturePresent 17742->17744 17743->17740 17746 b40394 17744->17746 17749 b40358 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17746->17749 17748 b40477 17748->17740 17749->17748 17757 b31088 17750->17757 17754 b44657 17753->17754 17756 b4467d 17753->17756 17755 b44667 FreeLibrary 17754->17755 17754->17756 17755->17754 17756->17658 17760 b44476 17757->17760 17759 b3109a 17759->17658 17759->17659 17761 b442d2 try_get_function 5 API calls 17760->17761 17762 b44490 17761->17762 17762->17759 17764 b43124 17763->17764 17765 b4313b 17763->17765 17764->17765 17766 b43131 GetLastError 17764->17766 17765->17549 17766->17765 17770 b444b0 17767->17770 17769 b31257 17769->17546 17771 b442d2 try_get_function 5 API calls 17770->17771 17772 b444ca 17771->17772 17772->17769 17774 b3ffe6 GetStartupInfoW 17773->17774 17774->17554 17776 b4afd1 17775->17776 17777 b4afda 17775->17777 17782 b4aec7 17776->17782 17777->17558 18360 b4b2fa 17779->18360 17802 b48d26 GetLastError 17782->17802 17784 b4aed4 17823 b4afe6 17784->17823 17786 b4aedc 17832 b4ac5b 17786->17832 17789 b4aef3 17789->17777 17792 b4af36 17859 b48433 17792->17859 17796 b4af31 17856 b48846 17796->17856 17798 b4af7a 17798->17792 17865 b4ab31 17798->17865 17799 b4af4e 17799->17798 17800 b48433 _free 20 API calls 17799->17800 17800->17798 17803 b48d3c 17802->17803 17804 b48d48 17802->17804 17868 b4a368 17803->17868 17875 b484fe 17804->17875 17809 b48d91 SetLastError 17809->17784 17810 b48d5c 17812 b48433 _free 20 API calls 17810->17812 17814 b48d62 17812->17814 17817 b48d9d SetLastError 17814->17817 17815 b48d78 17889 b48b98 17815->17889 17894 b484bb 17817->17894 17820 b48433 _free 20 API calls 17822 b48d8a 17820->17822 17822->17809 17822->17817 17824 b4aff2 ___FrameUnwindToState 17823->17824 17825 b48d26 _unexpected 38 API calls 17824->17825 17830 b4affc 17825->17830 17827 b4b080 ___FrameUnwindToState 17827->17786 17829 b484bb _abort 38 API calls 17829->17830 17830->17827 17830->17829 17831 b48433 _free 20 API calls 17830->17831 18209 b4a146 EnterCriticalSection 17830->18209 18210 b4b077 17830->18210 17831->17830 18214 b44e10 17832->18214 17835 b4ac7c GetOEMCP 17838 b4aca5 17835->17838 17836 b4ac8e 17837 b4ac93 GetACP 17836->17837 17836->17838 17837->17838 17838->17789 17839 b4846d 17838->17839 17840 b484ab 17839->17840 17841 b4847b _abort 17839->17841 17843 b48846 _free 20 API calls 17840->17843 17841->17840 17842 b48496 RtlAllocateHeap 17841->17842 17845 b47fdd new 7 API calls 17841->17845 17842->17841 17844 b484a9 17842->17844 17843->17844 17844->17792 17846 b4b088 17844->17846 17845->17841 17847 b4ac5b 40 API calls 17846->17847 17848 b4b0a7 17847->17848 17850 b4b0f8 IsValidCodePage 17848->17850 17853 b4b0ae 17848->17853 17855 b4b11d ___scrt_get_show_window_mode 17848->17855 17849 b3fcf1 TranslatorGuardHandler 5 API calls 17851 b4af29 17849->17851 17852 b4b10a GetCPInfo 17850->17852 17850->17853 17851->17796 17851->17799 17852->17853 17852->17855 17853->17849 18251 b4ad33 GetCPInfo 17855->18251 17857 b48daa _abort 20 API calls 17856->17857 17858 b4884b 17857->17858 17858->17792 17860 b4843e RtlFreeHeap 17859->17860 17861 b48467 _free 17859->17861 17860->17861 17862 b48453 17860->17862 17861->17789 17863 b48846 _free 18 API calls 17862->17863 17864 b48459 GetLastError 17863->17864 17864->17861 18324 b4aaee 17865->18324 17905 b4a1a5 17868->17905 17871 b4a3a7 TlsGetValue 17872 b4a39b 17871->17872 17873 b3fcf1 TranslatorGuardHandler 5 API calls 17872->17873 17874 b48d42 17873->17874 17874->17804 17874->17809 17880 b4850b _abort 17875->17880 17876 b4854b 17879 b48846 _free 19 API calls 17876->17879 17877 b48536 HeapAlloc 17878 b48549 17877->17878 17877->17880 17878->17810 17882 b4a3be 17878->17882 17879->17878 17880->17876 17880->17877 17919 b47fdd 17880->17919 17883 b4a1a5 _abort 5 API calls 17882->17883 17884 b4a3e5 17883->17884 17885 b4a400 TlsSetValue 17884->17885 17886 b4a3f4 17884->17886 17885->17886 17887 b3fcf1 TranslatorGuardHandler 5 API calls 17886->17887 17888 b48d71 17887->17888 17888->17810 17888->17815 17935 b48b70 17889->17935 18043 b4b68d 17894->18043 17897 b484cb 17899 b484d5 IsProcessorFeaturePresent 17897->17899 17900 b484f3 17897->17900 17901 b484e0 17899->17901 18079 b47511 17900->18079 18073 b4855b 17901->18073 17906 b4a1d1 17905->17906 17907 b4a1d5 17905->17907 17906->17907 17910 b4a1f5 17906->17910 17912 b4a241 17906->17912 17907->17871 17907->17872 17909 b4a201 GetProcAddress 17911 b4a211 __crt_fast_encode_pointer 17909->17911 17910->17907 17910->17909 17911->17907 17913 b4a262 LoadLibraryExW 17912->17913 17914 b4a257 17912->17914 17915 b4a297 17913->17915 17916 b4a27f GetLastError 17913->17916 17914->17906 17915->17914 17918 b4a2ae FreeLibrary 17915->17918 17916->17915 17917 b4a28a LoadLibraryExW 17916->17917 17917->17915 17918->17914 17924 b48021 17919->17924 17921 b3fcf1 TranslatorGuardHandler 5 API calls 17922 b4801d 17921->17922 17922->17880 17923 b47ff3 17923->17921 17925 b4802d ___FrameUnwindToState 17924->17925 17930 b4a146 EnterCriticalSection 17925->17930 17927 b48038 17931 b4806a 17927->17931 17929 b4805f ___FrameUnwindToState 17929->17923 17930->17927 17934 b4a18e LeaveCriticalSection 17931->17934 17933 b48071 17933->17929 17934->17933 17941 b48ab0 17935->17941 17937 b48b94 17938 b48b20 17937->17938 17952 b489b4 17938->17952 17940 b48b44 17940->17820 17942 b48abc ___FrameUnwindToState 17941->17942 17947 b4a146 EnterCriticalSection 17942->17947 17944 b48ac6 17948 b48aec 17944->17948 17946 b48ae4 ___FrameUnwindToState 17946->17937 17947->17944 17951 b4a18e LeaveCriticalSection 17948->17951 17950 b48af6 17950->17946 17951->17950 17953 b489c0 ___FrameUnwindToState 17952->17953 17960 b4a146 EnterCriticalSection 17953->17960 17955 b489ca 17961 b48cdb 17955->17961 17957 b489e2 17965 b489f8 17957->17965 17959 b489f0 ___FrameUnwindToState 17959->17940 17960->17955 17962 b48cea __fassign 17961->17962 17963 b48d11 __fassign 17961->17963 17962->17963 17968 b4bf99 17962->17968 17963->17957 18042 b4a18e LeaveCriticalSection 17965->18042 17967 b48a02 17967->17959 17975 b4bfaf 17968->17975 17993 b4c019 17968->17993 17970 b48433 _free 20 API calls 17971 b4c03b 17970->17971 17973 b48433 _free 20 API calls 17971->17973 17972 b4bfe2 17974 b4c004 17972->17974 17980 b48433 _free 20 API calls 17972->17980 17976 b4c04e 17973->17976 17977 b48433 _free 20 API calls 17974->17977 17975->17972 17978 b48433 _free 20 API calls 17975->17978 17975->17993 17979 b48433 _free 20 API calls 17976->17979 17981 b4c00e 17977->17981 17983 b4bfd7 17978->17983 17985 b4c05c 17979->17985 17986 b4bff9 17980->17986 17987 b48433 _free 20 API calls 17981->17987 17982 b4c0d5 17988 b48433 _free 20 API calls 17982->17988 17996 b4bb78 17983->17996 17984 b4c075 17984->17982 17990 b48433 20 API calls _free 17984->17990 17991 b48433 _free 20 API calls 17985->17991 18024 b4bc76 17986->18024 17987->17993 17994 b4c0db 17988->17994 17990->17984 17995 b4c067 17991->17995 17993->17970 17993->17995 17994->17963 18036 b4c10c 17995->18036 17997 b4bb89 17996->17997 18023 b4bc72 17996->18023 17998 b4bb9a 17997->17998 17999 b48433 _free 20 API calls 17997->17999 18000 b4bbac 17998->18000 18002 b48433 _free 20 API calls 17998->18002 17999->17998 18001 b4bbbe 18000->18001 18003 b48433 _free 20 API calls 18000->18003 18002->18000 18003->18001 18023->17972 18025 b4bc83 18024->18025 18035 b4bcdb 18024->18035 18026 b4bc93 18025->18026 18027 b48433 _free 20 API calls 18025->18027 18028 b4bca5 18026->18028 18029 b48433 _free 20 API calls 18026->18029 18027->18026 18029->18028 18035->17974 18037 b4c119 18036->18037 18041 b4c137 18036->18041 18038 b4bd1b __fassign 20 API calls 18037->18038 18037->18041 18039 b4c131 18038->18039 18040 b48433 _free 20 API calls 18039->18040 18040->18041 18041->17984 18042->17967 18082 b4b5fb 18043->18082 18046 b4b6e8 18047 b4b6f4 _unexpected 18046->18047 18052 b4b721 _abort 18047->18052 18055 b4b71b _abort 18047->18055 18096 b48daa GetLastError 18047->18096 18049 b4b76d 18050 b48846 _free 20 API calls 18049->18050 18051 b4b772 18050->18051 18115 b48725 18051->18115 18058 b4b799 18052->18058 18118 b4a146 EnterCriticalSection 18052->18118 18055->18049 18055->18052 18072 b4b750 18055->18072 18060 b4b7f8 18058->18060 18062 b4b7f0 18058->18062 18069 b4b823 18058->18069 18119 b4a18e LeaveCriticalSection 18058->18119 18060->18069 18120 b4b6df 18060->18120 18063 b47511 _abort 28 API calls 18062->18063 18063->18060 18066 b48d26 _unexpected 38 API calls 18070 b4b886 18066->18070 18068 b4b6df _abort 38 API calls 18068->18069 18123 b4b8a8 18069->18123 18071 b48d26 _unexpected 38 API calls 18070->18071 18070->18072 18071->18072 18127 b51b69 18072->18127 18074 b48577 _abort ___scrt_get_show_window_mode 18073->18074 18075 b485a3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18074->18075 18076 b48674 _abort 18075->18076 18077 b3fcf1 TranslatorGuardHandler 5 API calls 18076->18077 18078 b48692 18077->18078 18078->17900 18146 b47320 18079->18146 18085 b4b5a1 18082->18085 18084 b484c0 18084->17897 18084->18046 18086 b4b5ad ___FrameUnwindToState 18085->18086 18091 b4a146 EnterCriticalSection 18086->18091 18088 b4b5bb 18092 b4b5ef 18088->18092 18090 b4b5e2 ___FrameUnwindToState 18090->18084 18091->18088 18095 b4a18e LeaveCriticalSection 18092->18095 18094 b4b5f9 18094->18090 18095->18094 18097 b48dc3 18096->18097 18100 b48dc9 18096->18100 18098 b4a368 _abort 11 API calls 18097->18098 18098->18100 18099 b484fe _abort 17 API calls 18101 b48ddb 18099->18101 18100->18099 18102 b48e20 SetLastError 18100->18102 18103 b48de3 18101->18103 18105 b4a3be _abort 11 API calls 18101->18105 18104 b48e29 18102->18104 18106 b48433 _free 17 API calls 18103->18106 18104->18055 18107 b48df8 18105->18107 18108 b48de9 18106->18108 18107->18103 18109 b48dff 18107->18109 18110 b48e17 SetLastError 18108->18110 18111 b48b98 _abort 17 API calls 18109->18111 18110->18104 18112 b48e0a 18111->18112 18113 b48433 _free 17 API calls 18112->18113 18114 b48e10 18113->18114 18114->18102 18114->18110 18130 b486aa 18115->18130 18117 b48731 18117->18072 18118->18058 18119->18062 18121 b48d26 _unexpected 38 API calls 18120->18121 18122 b4b6e4 18121->18122 18122->18068 18124 b4b877 18123->18124 18125 b4b8ae 18123->18125 18124->18066 18124->18070 18124->18072 18145 b4a18e LeaveCriticalSection 18125->18145 18128 b3fcf1 TranslatorGuardHandler 5 API calls 18127->18128 18129 b51b74 18128->18129 18129->18129 18131 b48daa _abort 20 API calls 18130->18131 18132 b486c0 18131->18132 18133 b4871f 18132->18133 18135 b486ce 18132->18135 18141 b48735 IsProcessorFeaturePresent 18133->18141 18138 b3fcf1 TranslatorGuardHandler 5 API calls 18135->18138 18136 b48724 18137 b486aa ___std_exception_copy 26 API calls 18136->18137 18139 b48731 18137->18139 18140 b486f5 18138->18140 18139->18117 18140->18117 18142 b48740 18141->18142 18143 b4855b _abort 8 API calls 18142->18143 18144 b48755 GetCurrentProcess TerminateProcess 18143->18144 18144->18136 18145->18124 18147 b4732c _unexpected 18146->18147 18148 b47344 18147->18148 18149 b40006 _abort GetModuleHandleW 18147->18149 18176 b4a146 EnterCriticalSection 18148->18176 18151 b47338 18149->18151 18151->18148 18168 b4747a GetModuleHandleExW 18151->18168 18152 b473ea 18180 b4742a 18152->18180 18155 b473c1 18157 b473d9 18155->18157 18163 b48166 _abort 5 API calls 18155->18163 18164 b48166 _abort 5 API calls 18157->18164 18158 b47407 18183 b47439 18158->18183 18159 b47433 18162 b51b69 _abort 5 API calls 18159->18162 18167 b47438 18162->18167 18163->18157 18164->18152 18165 b4734c 18165->18152 18165->18155 18177 b47e01 18165->18177 18169 b474a4 GetProcAddress 18168->18169 18170 b474c7 18168->18170 18173 b474b9 18169->18173 18171 b474d6 18170->18171 18172 b474cd FreeLibrary 18170->18172 18174 b3fcf1 TranslatorGuardHandler 5 API calls 18171->18174 18172->18171 18173->18170 18175 b474e0 18174->18175 18175->18148 18176->18165 18191 b47b1b 18177->18191 18202 b4a18e LeaveCriticalSection 18180->18202 18182 b47403 18182->18158 18182->18159 18203 b4a583 18183->18203 18194 b47aca 18191->18194 18195 b47ad6 ___FrameUnwindToState 18194->18195 18196 b4a146 _abort EnterCriticalSection 18195->18196 18197 b47ae4 18196->18197 18198 b47b8a _abort 20 API calls 18197->18198 18199 b47af1 18198->18199 18200 b47b0f _abort LeaveCriticalSection 18199->18200 18201 b47b02 ___FrameUnwindToState 18200->18201 18202->18182 18204 b4a5a8 18203->18204 18208 b4a59e 18203->18208 18205 b4a1a5 _abort 5 API calls 18204->18205 18205->18208 18206 b3fcf1 TranslatorGuardHandler 5 API calls 18207 b47443 18206->18207 18208->18206 18209->17830 18213 b4a18e LeaveCriticalSection 18210->18213 18212 b4b07e 18212->17830 18213->18212 18215 b44e23 18214->18215 18216 b44e2d 18214->18216 18215->17835 18215->17836 18216->18215 18217 b48d26 _unexpected 38 API calls 18216->18217 18218 b44e4e 18217->18218 18222 b48e75 18218->18222 18223 b44e67 18222->18223 18224 b48e88 18222->18224 18226 b48ea2 18223->18226 18224->18223 18230 b4c1e6 18224->18230 18227 b48eb5 18226->18227 18228 b48eca 18226->18228 18227->18228 18229 b4afe6 __fassign 38 API calls 18227->18229 18228->18215 18229->18228 18231 b4c1f2 ___FrameUnwindToState 18230->18231 18232 b48d26 _unexpected 38 API calls 18231->18232 18233 b4c1fb 18232->18233 18234 b4c249 ___FrameUnwindToState 18233->18234 18242 b4a146 EnterCriticalSection 18233->18242 18234->18223 18236 b4c219 18243 b4c25d 18236->18243 18241 b484bb _abort 38 API calls 18241->18234 18242->18236 18244 b4c26b __fassign 18243->18244 18246 b4c22d 18243->18246 18245 b4bf99 __fassign 20 API calls 18244->18245 18244->18246 18245->18246 18247 b4c24c 18246->18247 18250 b4a18e LeaveCriticalSection 18247->18250 18249 b4c240 18249->18234 18249->18241 18250->18249 18252 b4ae17 18251->18252 18253 b4ad6d 18251->18253 18256 b3fcf1 TranslatorGuardHandler 5 API calls 18252->18256 18261 b4bdff 18253->18261 18258 b4aec3 18256->18258 18258->17853 18262 b44e10 __fassign 38 API calls 18261->18262 18263 b4be1f MultiByteToWideChar 18262->18263 18265 b4be5d 18263->18265 18273 b4bef5 18263->18273 18268 b4846d __onexit 21 API calls 18265->18268 18270 b4be7e __vswprintf_c_l ___scrt_get_show_window_mode 18265->18270 18266 b3fcf1 TranslatorGuardHandler 5 API calls 18269 b4adce 18266->18269 18267 b4beef 18280 b4a01d 18267->18280 18268->18270 18275 b49fd2 18269->18275 18270->18267 18272 b4bec3 MultiByteToWideChar 18270->18272 18272->18267 18274 b4bedf GetStringTypeW 18272->18274 18273->18266 18274->18267 18276 b44e10 __fassign 38 API calls 18275->18276 18277 b49fe5 18276->18277 18281 b4a029 18280->18281 18282 b4a03a 18280->18282 18281->18282 18283 b48433 _free 20 API calls 18281->18283 18282->18273 18283->18282 18325 b4aafa ___FrameUnwindToState 18324->18325 18332 b4a146 EnterCriticalSection 18325->18332 18327 b4ab04 18333 b4ab59 18327->18333 18332->18327 18345 b4b279 18333->18345 18361 b44e10 __fassign 38 API calls 18360->18361 18362 b4b30e 18361->18362 18362->17558 18453 b3f4b0 18363->18453 18366 b34869 18370 b34b9e GetModuleFileNameW 18366->18370 18464 b4710a 18366->18464 18367 b34818 GetProcAddress 18368 b34841 GetProcAddress 18367->18368 18369 b34831 18367->18369 18368->18366 18371 b3484d 18368->18371 18369->18368 18381 b34bb9 18370->18381 18371->18366 18374 b34ae7 GetModuleFileNameW CreateFileW 18375 b34b92 CloseHandle 18374->18375 18376 b34b16 SetFilePointer 18374->18376 18375->18370 18376->18375 18377 b34b26 ReadFile 18376->18377 18377->18375 18379 b34b45 18377->18379 18379->18375 18383 b347aa 2 API calls 18379->18383 18382 b34bee CompareStringW 18381->18382 18384 b34c24 GetFileAttributesW 18381->18384 18385 b34c38 18381->18385 18455 b32b7c 18381->18455 18458 b347aa 18381->18458 18382->18381 18383->18379 18384->18381 18384->18385 18386 b34c45 18385->18386 18388 b34c77 18385->18388 18389 b34c5d GetFileAttributesW 18386->18389 18391 b34c71 18386->18391 18387 b34d86 OleInitialize 18411 b353bf GetCPInfo 18387->18411 18388->18387 18390 b32b7c GetVersionExW 18388->18390 18389->18386 18389->18391 18392 b34c91 18390->18392 18391->18388 18393 b34c98 18392->18393 18394 b34cfe 18392->18394 18396 b347aa 2 API calls 18393->18396 18395 b337c1 _swprintf 51 API calls 18394->18395 18397 b34d26 AllocConsole 18395->18397 18398 b34ca2 18396->18398 18399 b34d33 GetCurrentProcessId AttachConsole 18397->18399 18400 b34d7e ExitProcess 18397->18400 18401 b347aa 2 API calls 18398->18401 18475 b44975 18399->18475 18403 b34cac 18401->18403 18468 b340a7 18403->18468 18404 b34d54 GetStdHandle WriteConsoleW Sleep FreeConsole 18404->18400 18407 b337c1 _swprintf 51 API calls 18408 b34cda 18407->18408 18409 b340a7 54 API calls 18408->18409 18410 b34ce9 18409->18410 18410->18400 18412 b353e3 IsDBCSLeadByte 18411->18412 18412->18412 18413 b353fb 18412->18413 18413->17564 18420 b3d10e 18414->18420 18415 b3d224 18415->17573 18415->17574 18416 b3d156 CharUpperW 18416->18420 18417 b3d1d9 CharUpperW 18417->18420 18419 b3d17d CharUpperW 18419->18420 18420->18415 18420->18416 18420->18417 18420->18419 18546 b342d3 18420->18546 18422 b3f4b0 18421->18422 18423 b3e5d0 SetEnvironmentVariableW 18422->18423 18425 b3e5f3 18423->18425 18424 b3e61b 18424->17566 18425->18424 18426 b3e60f SetEnvironmentVariableW 18425->18426 18426->18424 18428 b31b7e __vswprintf_c_l 51 API calls 18427->18428 18429 b337d9 SetEnvironmentVariableW GetModuleHandleW LoadIconW LoadBitmapW 18428->18429 18430 b3b9eb 18429->18430 18431 b347aa 2 API calls 18430->18431 18432 b3b9fd OleInitialize 18431->18432 18433 b3ba1f SHGetMalloc 18432->18433 18433->17576 18665 b33a2c 18434->18665 18438 b33a1a 18438->17583 18440 b3ba54 OleUninitialize 18439->18440 18440->17587 18454 b347fe GetModuleHandleW 18453->18454 18454->18366 18454->18367 18456 b32b90 GetVersionExW 18455->18456 18457 b32bcc 18455->18457 18456->18457 18457->18381 18459 b3f4b0 18458->18459 18460 b347b7 GetSystemDirectoryW 18459->18460 18461 b347cf 18460->18461 18462 b347ed 18460->18462 18463 b347e0 LoadLibraryW 18461->18463 18462->18381 18463->18462 18465 b47123 __vswprintf_c_l 18464->18465 18477 b467a9 18465->18477 18469 b340d7 18468->18469 18470 b340e0 LoadStringW 18469->18470 18471 b340f6 LoadStringW 18469->18471 18470->18471 18472 b34108 18470->18472 18471->18472 18536 b33884 18472->18536 18474 b34116 18474->18407 18476 b4497d 18475->18476 18476->18404 18476->18476 18495 b45b4d 18477->18495 18479 b467f6 18480 b44e10 __fassign 38 API calls 18479->18480 18487 b46802 18480->18487 18481 b467d0 18483 b48846 _free 20 API calls 18481->18483 18482 b467bb 18482->18479 18482->18481 18494 b34adc 18482->18494 18484 b467d5 18483->18484 18486 b48725 ___std_exception_copy 26 API calls 18484->18486 18486->18494 18488 b46831 18487->18488 18502 b46240 18487->18502 18489 b4689d 18488->18489 18509 b470b6 18488->18509 18490 b470b6 26 API calls 18489->18490 18492 b46964 __vswprintf_c_l 18490->18492 18493 b48846 _free 20 API calls 18492->18493 18492->18494 18493->18494 18494->18370 18494->18374 18496 b45b65 18495->18496 18497 b45b52 18495->18497 18496->18482 18498 b48846 _free 20 API calls 18497->18498 18499 b45b57 18498->18499 18500 b48725 ___std_exception_copy 26 API calls 18499->18500 18501 b45b62 18500->18501 18501->18482 18503 b46262 18502->18503 18504 b4624c 18502->18504 18524 b46216 18503->18524 18504->18503 18505 b46254 18504->18505 18515 b49ce3 18505->18515 18508 b46260 18508->18487 18510 b470c6 18509->18510 18511 b470da 18509->18511 18510->18511 18512 b48846 _free 20 API calls 18510->18512 18511->18489 18513 b470cf 18512->18513 18514 b48725 ___std_exception_copy 26 API calls 18513->18514 18514->18511 18516 b44e10 __fassign 38 API calls 18515->18516 18517 b49d04 18516->18517 18523 b49d0e 18517->18523 18528 b49caa 18517->18528 18520 b3fcf1 TranslatorGuardHandler 5 API calls 18521 b49db1 18520->18521 18521->18508 18522 b4bdff __vswprintf_c_l 42 API calls 18522->18523 18523->18520 18525 b46222 18524->18525 18526 b4622f 18524->18526 18525->18508 18531 b49c84 18526->18531 18529 b44e10 __fassign 38 API calls 18528->18529 18530 b49cbd 18529->18530 18530->18522 18532 b48d26 _unexpected 38 API calls 18531->18532 18533 b49c8f 18532->18533 18534 b48e75 __fassign 38 API calls 18533->18534 18535 b49c9f 18534->18535 18535->18525 18537 b3388e 18536->18537 18540 b33902 _strlen 18537->18540 18543 b33960 _wcsrchr 18537->18543 18544 b3557f WideCharToMultiByte 18537->18544 18539 b3557f WideCharToMultiByte 18541 b3392d _strlen 18539->18541 18540->18539 18542 b337c1 _swprintf 51 API calls 18541->18542 18542->18543 18543->18474 18545 b355ac 18544->18545 18545->18540 18547 b342f9 _wcslen 18546->18547 18548 b342e2 ___scrt_get_show_window_mode 18546->18548 18550 b341e1 18547->18550 18548->18420 18551 b341f2 __vswprintf_c_l 18550->18551 18554 b34222 18551->18554 18553 b3421c 18553->18548 18555 b34239 18554->18555 18556 b3422f 18554->18556 18558 b342a9 GetCurrentProcessId 18555->18558 18559 b3425e 18555->18559 18562 b341a3 18556->18562 18560 b34279 ___InternalCxxFrameHandler 18558->18560 18559->18560 18568 b3198c 18559->18568 18560->18553 18563 b341ac 18562->18563 18566 b341db 18562->18566 18564 b347aa 2 API calls 18563->18564 18565 b341b6 18564->18565 18565->18566 18567 b341bc GetProcAddress GetProcAddress 18565->18567 18566->18555 18567->18566 18573 b31b7e 18568->18573 18574 b31b95 ___scrt_initialize_default_local_stdio_options 18573->18574 18580 b45cd2 18574->18580 18577 b3188e 18620 b34f24 18577->18620 18583 b44995 18580->18583 18584 b449d5 18583->18584 18585 b449bd 18583->18585 18584->18585 18587 b449dd 18584->18587 18586 b48846 _free 20 API calls 18585->18586 18588 b449c2 18586->18588 18589 b44e10 __fassign 38 API calls 18587->18589 18590 b48725 ___std_exception_copy 26 API calls 18588->18590 18592 b449ed 18589->18592 18591 b449cd 18590->18591 18593 b3fcf1 TranslatorGuardHandler 5 API calls 18591->18593 18600 b44ddb 18592->18600 18595 b319af 18593->18595 18595->18577 18601 b44dfa __vswprintf_c_l 18600->18601 18602 b48846 _free 20 API calls 18601->18602 18603 b44a65 18602->18603 18604 b45016 18603->18604 18666 b33a36 __EH_prolog 18665->18666 18667 b33a62 GetModuleFileNameW 18666->18667 18670 b33a89 18666->18670 18668 b33a7c _wcsrchr 18667->18668 18669 b33a13 18668->18669 18668->18670 18684 b33d9c GetModuleHandleW FindResourceW 18669->18684 18688 b31f07 18670->18688 18673 b33bf2 18675 b3217b 70 API calls 18673->18675 18683 b33c3c 18673->18683 18677 b33c0c new 18675->18677 18678 b320a8 73 API calls 18677->18678 18677->18683 18681 b33c32 new 18678->18681 18680 b33ab6 18680->18673 18680->18683 18704 b32286 18680->18704 18712 b320a8 18680->18712 18720 b3217b 18680->18720 18681->18683 18725 b35386 MultiByteToWideChar 18681->18725 18697 b31be1 18683->18697 18685 b33dca 18684->18685 18687 b33dc4 18684->18687 18686 b33884 52 API calls 18685->18686 18686->18687 18687->18438 18689 b31f11 18688->18689 18690 b31f67 CreateFileW 18689->18690 18691 b31fe5 18690->18691 18692 b31f94 GetLastError 18690->18692 18691->18680 18727 b333ec 18692->18727 18694 b31fb4 18694->18691 18695 b31fb8 CreateFileW GetLastError 18694->18695 18696 b31fdc 18695->18696 18696->18691 18698 b31c05 18697->18698 18699 b31c16 18697->18699 18698->18699 18700 b31c11 18698->18700 18701 b31c18 18698->18701 18699->18669 18747 b31dce 18700->18747 18754 b31c84 18701->18754 18705 b322aa SetFilePointer 18704->18705 18706 b32299 18704->18706 18707 b322e3 18705->18707 18708 b322c8 GetLastError 18705->18708 18706->18707 18782 b31a61 18706->18782 18707->18680 18708->18707 18710 b322d2 18708->18710 18710->18707 18711 b31a61 68 API calls 18710->18711 18711->18707 18714 b320bf 18712->18714 18715 b32112 18714->18715 18717 b32120 18714->18717 18719 b32122 18714->18719 18788 b31df7 18714->18788 18800 b31a19 18715->18800 18717->18680 18718 b31df7 5 API calls 18718->18719 18719->18717 18719->18718 18815 b32032 18720->18815 18723 b321a6 18723->18680 18724 b31a61 68 API calls 18724->18723 18728 b333f9 18727->18728 18736 b33403 _wcslen 18728->18736 18737 b33593 18728->18737 18730 b33411 _wcslen 18740 b335bf 18730->18740 18736->18694 18744 b344cc 18737->18744 18745 b335a1 18744->18745 18746 b344dc CharUpperW 18744->18746 18745->18730 18746->18745 18748 b31dd7 18747->18748 18749 b31ddb 18747->18749 18748->18699 18755 b31cae 18754->18755 18756 b31c90 18754->18756 18756->18755 18783 b31a75 18782->18783 18784 b31a6a 18782->18784 18786 b31aca RaiseException 18783->18786 18785 b3188e 67 API calls 18784->18785 18785->18783 18787 b31a7e 18786->18787 18787->18705 18789 b31e10 ReadFile 18788->18789 18790 b31e05 GetStdHandle 18788->18790 18791 b31e49 18789->18791 18792 b31e29 18789->18792 18790->18789 18791->18714 18805 b31ee4 18792->18805 18809 b31a34 18800->18809 18812 b318b9 18809->18812 18818 b3203e 18815->18818 18819 b3209d 18815->18819 18816 b32075 SetFilePointer 18817 b32093 GetLastError 18816->18817 18816->18819 18817->18819 18818->18816 18819->18723 18819->18724 18861 b3e87d 18862 b3e88a 18861->18862 18863 b340a7 54 API calls 18862->18863 18864 b3e89e 18863->18864 18865 b337c1 _swprintf 51 API calls 18864->18865 18866 b3e8b0 SetDlgItemTextW 18865->18866 18869 b3c21c PeekMessageW 18866->18869 18870 b3c237 GetMessageW TranslateMessage DispatchMessageW 18869->18870 18871 b3c258 18869->18871 18870->18871 19996 b3eb6b 19997 b3eb75 19996->19997 19998 b3f1fe ___delayLoadHelper2@8 19 API calls 19997->19998 19999 b3eb82 19998->19999 21038 b3ee68 21039 b3ee72 21038->21039 21040 b3f1fe ___delayLoadHelper2@8 19 API calls 21039->21040 21040->21039 21158 b4824f 21159 b4825b ___FrameUnwindToState 21158->21159 21160 b48292 ___FrameUnwindToState 21159->21160 21166 b4a146 EnterCriticalSection 21159->21166 21162 b4826f 21163 b4c25d __fassign 20 API calls 21162->21163 21164 b4827f 21163->21164 21167 b48298 21164->21167 21166->21162 21170 b4a18e LeaveCriticalSection 21167->21170 21169 b4829f 21169->21160 21170->21169

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00B347F4: GetModuleHandleW.KERNEL32 ref: 00B3480C
                                          • Part of subcall function 00B347F4: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B34824
                                          • Part of subcall function 00B347F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B34847
                                        • OleInitialize.OLE32(00000000), ref: 00B3E8F1
                                          • Part of subcall function 00B353BF: GetCPInfo.KERNEL32(00000000,?), ref: 00B353D0
                                          • Part of subcall function 00B353BF: IsDBCSLeadByte.KERNEL32(00000000), ref: 00B353E4
                                        • GetCommandLineW.KERNEL32 ref: 00B3E914
                                        • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00B3E93B
                                        • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007002), ref: 00B3E950
                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 00B3E97D
                                          • Part of subcall function 00B3E5C3: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 00B3E5D9
                                          • Part of subcall function 00B3E5C3: SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00B3E615
                                        • CloseHandle.KERNEL32(00000000), ref: 00B3E984
                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe,00000800), ref: 00B3E99E
                                        • SetEnvironmentVariableW.KERNEL32(sfxname,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe), ref: 00B3E9B0
                                        • GetLocalTime.KERNEL32(?), ref: 00B3E9B7
                                        • _swprintf.LIBCMT ref: 00B3E9F6
                                        • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00B3EA08
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00B3EA0B
                                        • LoadIconW.USER32(00000000,00000064), ref: 00B3EA22
                                        • LoadBitmapW.USER32(00000065), ref: 00B3EA35
                                        • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0000C3C5,00000000), ref: 00B3EA85
                                        • Sleep.KERNEL32(?), ref: 00B3EABC
                                        • DeleteObject.GDI32 ref: 00B3EAFA
                                        • DeleteObject.GDI32(?), ref: 00B3EB06
                                          • Part of subcall function 00B3D104: CharUpperW.USER32(?,?,?,?,00001000), ref: 00B3D15C
                                          • Part of subcall function 00B3D104: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00B3D183
                                        • CloseHandle.KERNEL32 ref: 00B3EB48
                                        • OleUninitialize.OLE32 ref: 00B3EB4E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteLoadObjectProcUpperView$BitmapByteCommandDialogIconInfoInitializeLeadLineLocalMappingNameOpenParamSleepTimeUninitializeUnmap_swprintf
                                        • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                        • API String ID: 3132662180-2443902774
                                        • Opcode ID: e7d0258e22715fb36e7392936798fa2d5fa62284a9b249e04d9ce367c1cd1992
                                        • Instruction ID: 4754479df88c553b4f3d83e4ef67848235e51fa251373ac66c3a9500db1d9101
                                        • Opcode Fuzzy Hash: e7d0258e22715fb36e7392936798fa2d5fa62284a9b249e04d9ce367c1cd1992
                                        • Instruction Fuzzy Hash: D251E231942300ABC310AB65EC49F6B7BE8EB49B01F5444DAF949A32F1DF34D984CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __allrem
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe$Cyber.exe$z01$zip$zipx$zx01
                                        • API String ID: 2933888876-3295552768
                                        • Opcode ID: dcd984be6770beee6d30876cb40cc9e1135fc99fc17b2e17dd7c766ad0acd6a5
                                        • Instruction ID: ac21913cdc2abea1c0c9669a3e2174cc775a187b44f16ef0026724faad42da8c
                                        • Opcode Fuzzy Hash: dcd984be6770beee6d30876cb40cc9e1135fc99fc17b2e17dd7c766ad0acd6a5
                                        • Instruction Fuzzy Hash: EC8290B1A10218EFDB24EF28DC91BAA77E4FB15350F2444EAF949D7262DB709D84CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1238 b329f7-b32a1d call b3f4b0 1241 b32a91-b32a9a FindNextFileW 1238->1241 1242 b32a1f-b32a32 FindFirstFileW 1238->1242 1243 b32ab0-b32ab2 1241->1243 1244 b32a9c-b32aaa GetLastError 1241->1244 1245 b32ab8-b32b61 call b345c8 call b3375a call b34d93 * 3 1242->1245 1246 b32a38-b32a53 call b333ec 1242->1246 1243->1245 1248 b32b66-b32b79 1243->1248 1244->1243 1245->1248 1252 b32a55-b32a68 FindFirstFileW 1246->1252 1253 b32a6a-b32a73 GetLastError 1246->1253 1252->1245 1252->1253 1256 b32a75-b32a78 1253->1256 1257 b32a84 1253->1257 1256->1257 1259 b32a7a-b32a7d 1256->1259 1260 b32a86-b32a8c 1257->1260 1259->1257 1262 b32a7f-b32a82 1259->1262 1260->1248 1262->1260
                                        APIs
                                        • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00B328F5,000000FF,?,?), ref: 00B32A2C
                                        • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00B328F5,000000FF,?,?), ref: 00B32A62
                                        • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00B328F5,000000FF,?,?), ref: 00B32A6A
                                        • FindNextFileW.KERNEL32(?,?,?,?,?,?,00B328F5,000000FF,?,?), ref: 00B32A92
                                        • GetLastError.KERNEL32(?,?,?,?,00B328F5,000000FF,?,?), ref: 00B32A9E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FileFind$ErrorFirstLast$Next
                                        • String ID:
                                        • API String ID: 869497890-0
                                        • Opcode ID: ab13afe311742c23afea9ef8c01c758d73b21e3d112d6875111462b98c395ed8
                                        • Instruction ID: 440df985f9f100d560968cecd69493f009143b5b5730cde9e182c1195da522af
                                        • Opcode Fuzzy Hash: ab13afe311742c23afea9ef8c01c758d73b21e3d112d6875111462b98c395ed8
                                        • Instruction Fuzzy Hash: 77416E76609245AFC324EF68C880ADBF7E8FF48351F144A6AF5A9D3240DB34AD54CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentProcess.KERNEL32(?,?,00B4740F,?,00B598A8,0000000C,00B47522,?,00000002,00000000), ref: 00B4745A
                                        • TerminateProcess.KERNEL32(00000000,?,00B4740F,?,00B598A8,0000000C,00B47522,?,00000002,00000000), ref: 00B47461
                                        • ExitProcess.KERNEL32 ref: 00B47473
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: d935b440ed387f314db1f81001694b34310118154d07e123ef700fed802f6d75
                                        • Instruction ID: 9c7ba27c96579d5801c01b4daee6736fb9871e0c7c3d079c7bad6ce4a51dd2f4
                                        • Opcode Fuzzy Hash: d935b440ed387f314db1f81001694b34310118154d07e123ef700fed802f6d75
                                        • Instruction Fuzzy Hash: EAE04F31041604ABCF116F54DD08B593FA9EB01352F044494F94897231CF35DE51EA80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$<$@$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                        • API String ID: 3519838083-2639842667
                                        • Opcode ID: 794751942a2a66af2decf0d581c321cb3209c664b902a2bdf8685d52e000ae39
                                        • Instruction ID: b632e432ce15ea23e454d7dba629e91b7bb149e94b5a2423d7aca271cf51fee9
                                        • Opcode Fuzzy Hash: 794751942a2a66af2decf0d581c321cb3209c664b902a2bdf8685d52e000ae39
                                        • Instruction Fuzzy Hash: 6732C371940348BEEB21ABA49C8AFBA3BE8EB05701F6040E5F645B71E1CF745D85CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 250 b347f4-b34816 call b3f4b0 GetModuleHandleW 253 b34869-b34ad0 250->253 254 b34818-b3482f GetProcAddress 250->254 257 b34ad6-b34ae1 call b4710a 253->257 258 b34b9e-b34bcf GetModuleFileNameW call b336a6 call b345c8 253->258 255 b34841-b3484b GetProcAddress 254->255 256 b34831-b3483e 254->256 255->253 259 b3484d-b34864 255->259 256->255 257->258 266 b34ae7-b34b14 GetModuleFileNameW CreateFileW 257->266 270 b34bd1-b34bdb call b32b7c 258->270 259->253 268 b34b92-b34b99 CloseHandle 266->268 269 b34b16-b34b24 SetFilePointer 266->269 268->258 269->268 271 b34b26-b34b43 ReadFile 269->271 277 b34be8 270->277 278 b34bdd-b34be1 call b347aa 270->278 271->268 273 b34b45-b34b6a 271->273 275 b34b87-b34b90 call b3439f 273->275 275->268 284 b34b6c-b34b86 call b347aa 275->284 279 b34bea-b34bec 277->279 285 b34be6 278->285 282 b34c0e-b34c30 call b3375a GetFileAttributesW 279->282 283 b34bee-b34c0c CompareStringW 279->283 286 b34c32-b34c36 282->286 292 b34c3a 282->292 283->282 283->286 284->275 285->279 286->270 291 b34c38 286->291 293 b34c3e-b34c43 291->293 292->293 294 b34c77-b34c79 293->294 295 b34c45 293->295 296 b34d86-b34d90 294->296 297 b34c7f-b34c96 call b336e9 call b32b7c 294->297 298 b34c47-b34c69 call b3375a GetFileAttributesW 295->298 308 b34c98-b34cf9 call b347aa * 2 call b340a7 call b337c1 call b340a7 call b3b680 297->308 309 b34cfe-b34d31 call b337c1 AllocConsole 297->309 304 b34c73 298->304 305 b34c6b-b34c6f 298->305 304->294 305->298 307 b34c71 305->307 307->294 315 b34d7e-b34d80 ExitProcess 308->315 314 b34d33-b34d78 GetCurrentProcessId AttachConsole call b44975 GetStdHandle WriteConsoleW Sleep FreeConsole 309->314 309->315 314->315
                                        APIs
                                        • GetModuleHandleW.KERNEL32 ref: 00B3480C
                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B34824
                                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B34847
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B34AF2
                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B34B0A
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B34B1C
                                        • ReadFile.KERNEL32(00000000,?,00007FFE,00B52470,00000000), ref: 00B34B3B
                                        • CloseHandle.KERNEL32(00000000), ref: 00B34B93
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B34BA9
                                        • CompareStringW.KERNEL32(00000400,00001001,00B524BC,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 00B34C03
                                        • GetFileAttributesW.KERNELBASE(?,?,00B52488,00000800,?,00000000,?,00000800), ref: 00B34C2C
                                        • GetFileAttributesW.KERNEL32(?,?,00B52548,00000800), ref: 00B34C65
                                          • Part of subcall function 00B347AA: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B347C5
                                          • Part of subcall function 00B347AA: LoadLibraryW.KERNELBASE(?,?,00B341B6,Crypt32.dll,?,00B34239,?,00B3421C,?,?,?,?), ref: 00B347E7
                                        • _swprintf.LIBCMT ref: 00B34CD5
                                        • _swprintf.LIBCMT ref: 00B34D21
                                          • Part of subcall function 00B337C1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B337D4
                                        • AllocConsole.KERNEL32 ref: 00B34D29
                                        • GetCurrentProcessId.KERNEL32 ref: 00B34D33
                                        • AttachConsole.KERNEL32(00000000), ref: 00B34D3A
                                        • _wcslen.LIBCMT ref: 00B34D4F
                                        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00B34D60
                                        • WriteConsoleW.KERNEL32(00000000), ref: 00B34D67
                                        • Sleep.KERNEL32(00002710), ref: 00B34D72
                                        • FreeConsole.KERNEL32 ref: 00B34D78
                                        • ExitProcess.KERNEL32 ref: 00B34D80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                        • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                        • API String ID: 1207345701-3298887752
                                        • Opcode ID: 102917b9f8240fce7348c36d188ee841fbc00a93e2ac8c714b9209950ff404bb
                                        • Instruction ID: bba4887f61bcd493ac5de6af064ab9ce8a6dac16e2f842c429cd720eae4b3d74
                                        • Opcode Fuzzy Hash: 102917b9f8240fce7348c36d188ee841fbc00a93e2ac8c714b9209950ff404bb
                                        • Instruction Fuzzy Hash: D7D183B250A3849ED735DF50C849B9FB7E8EF86306F5008DCE98997290DBB0954CCB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 328 b3d273-b3d28b call b3f484 call b3f4b0 333 b3d291-b3d2bb call b3bfea 328->333 334 b3de6d-b3de7a 328->334 333->334 337 b3d2c1-b3d2c6 333->337 338 b3d2c7-b3d2d5 337->338 339 b3d2d6-b3d2e6 call b3bc7b 338->339 342 b3d2e8 339->342 343 b3d2ea-b3d2ff call b35644 342->343 346 b3d301-b3d305 343->346 347 b3d30c-b3d30f 343->347 346->343 348 b3d307 346->348 349 b3d315 347->349 350 b3de39-b3de64 call b3bfea 347->350 348->350 352 b3d50b-b3d50d 349->352 353 b3d5c9-b3d5cb 349->353 354 b3d31c-b3d31f 349->354 355 b3d5ac-b3d5ae 349->355 350->338 361 b3de6a-b3de6c 350->361 352->350 360 b3d513-b3d51f 352->360 353->350 359 b3d5d1-b3d5d8 353->359 354->350 358 b3d325-b3d392 call b3b63e call b33631 call b328a3 call b329dd call b3241e call b32930 354->358 355->350 357 b3d5b4-b3d5c4 SetWindowTextW 355->357 357->350 427 b3d4f7-b3d506 call b328b9 358->427 428 b3d398-b3d39e 358->428 359->350 363 b3d5de-b3d5f7 359->363 364 b3d533-b3d538 360->364 365 b3d521-b3d532 call b45df8 360->365 361->334 367 b3d5f9 363->367 368 b3d5ff-b3d60b call b44975 363->368 370 b3d542-b3d54d call b3c142 364->370 371 b3d53a-b3d540 364->371 365->364 367->368 368->350 385 b3d611-b3d61a 368->385 375 b3d552-b3d554 370->375 371->375 378 b3d556-b3d55d call b44975 375->378 379 b3d55f-b3d57f call b44975 call b4676b 375->379 378->379 404 b3d581-b3d588 379->404 405 b3d598-b3d59a 379->405 389 b3d642-b3d645 385->389 390 b3d61c-b3d620 385->390 391 b3d722-b3d72f call b44953 389->391 392 b3d64b-b3d64e 389->392 390->389 395 b3d622-b3d62a 390->395 408 b3d731-b3d732 391->408 396 b3d650-b3d655 392->396 397 b3d65b-b3d676 392->397 395->350 401 b3d630-b3d63d call b44953 395->401 396->391 396->397 417 b3d6c0-b3d6c7 397->417 418 b3d678-b3d6b2 397->418 401->408 411 b3d58a-b3d58c 404->411 412 b3d58f-b3d597 call b45df8 404->412 405->350 407 b3d5a0-b3d5a7 call b44990 405->407 407->350 416 b3d733-b3d747 call b40bfb 408->416 411->412 412->405 435 b3d754-b3d7ac call b44953 call b3be95 GetDlgItem SetWindowTextW SendMessageW call b45cf6 416->435 436 b3d749-b3d74d 416->436 420 b3d6f3-b3d711 call b44975 * 2 417->420 421 b3d6c9-b3d6de call b44975 417->421 452 b3d6b6-b3d6b8 418->452 453 b3d6b4 418->453 420->416 459 b3d713-b3d720 call b45df8 420->459 421->420 438 b3d6e0-b3d6f2 call b45df8 421->438 427->350 433 b3d3a5-b3d3ba SetFileAttributesW 428->433 439 b3d460-b3d46c GetFileAttributesW 433->439 440 b3d3c0-b3d3f3 call b33309 call b32ffe call b44975 433->440 471 b3d7b1-b3d7b5 435->471 436->435 442 b3d74f-b3d751 436->442 438->420 448 b3d46e-b3d47d DeleteFileW 439->448 449 b3d4dc-b3d4f1 call b32930 439->449 478 b3d406-b3d414 call b3360d 440->478 479 b3d3f5-b3d404 call b44975 440->479 442->435 448->449 457 b3d47f-b3d482 448->457 449->427 465 b3d3a0 449->465 452->417 453->452 462 b3d486-b3d4b2 call b337c1 GetFileAttributesW 457->462 459->408 475 b3d484-b3d485 462->475 476 b3d4b4-b3d4ca MoveFileW 462->476 465->433 471->350 474 b3d7bb-b3d7cd SendMessageW 471->474 474->350 475->462 476->449 477 b3d4cc-b3d4d6 MoveFileExW 476->477 477->449 478->427 484 b3d41a-b3d459 call b44975 call b40480 478->484 479->478 479->484 484->439
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00B3D278
                                          • Part of subcall function 00B3BFEA: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00B3C0B2
                                        • SetFileAttributesW.KERNEL32(-00003C84,00000005,-00007C84,00000800,-0000FC8C,75C05540,?,00000000,00B3C327,?,00000003), ref: 00B3D3AD
                                        • _wcslen.LIBCMT ref: 00B3D3E8
                                        • _wcslen.LIBCMT ref: 00B3D3FC
                                        • _wcslen.LIBCMT ref: 00B3D421
                                        • GetFileAttributesW.KERNEL32(-00003C84), ref: 00B3D467
                                        • DeleteFileW.KERNEL32(-00003C84), ref: 00B3D475
                                        • _wcslen.LIBCMT ref: 00B3D557
                                        • _wcslen.LIBCMT ref: 00B3D560
                                        • SetWindowTextW.USER32(?,-00005C84), ref: 00B3D5BE
                                        • _wcslen.LIBCMT ref: 00B3D600
                                        • _wcsrchr.LIBVCRUNTIME ref: 00B3D73E
                                        • GetDlgItem.USER32(?,00000066), ref: 00B3D77E
                                        • SetWindowTextW.USER32(00000000,-0000103C), ref: 00B3D78E
                                        • SendMessageW.USER32(00000000,00000143,00000000,00B848F0), ref: 00B3D7A2
                                        • SendMessageW.USER32(00000000,00000143,00000000,-0000103C), ref: 00B3D7CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen$File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                                        • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                        • API String ID: 1808871598-312220925
                                        • Opcode ID: 1b2a523b12d9c559e7c0b5262b850589b522b8d0d8103f0eeb02cf4e5a998627
                                        • Instruction ID: b4f794fe2ba938f15b9715f05cc14035a92f31a9c5d962a2148675a0da8dbe3b
                                        • Opcode Fuzzy Hash: 1b2a523b12d9c559e7c0b5262b850589b522b8d0d8103f0eeb02cf4e5a998627
                                        • Instruction Fuzzy Hash: 87E15072900259AAEF24ABA4ED85EEE77FCEF04350F2040E6F555E7151EF709B848B60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 549 b33e2e-b33ea8 call b337f3 GetWindowRect GetClientRect 552 b33f57-b33f5f 549->552 553 b33eae-b33eb6 549->553 554 b33f61-b33f93 GetWindowTextW call b33884 SetWindowTextW 552->554 555 b33f99-b33fb4 GetSystemMetrics GetWindow 552->555 553->555 556 b33ebc-b33f0b 553->556 554->555 558 b34092-b34094 555->558 559 b33f12-b33f14 556->559 560 b33f0d 556->560 563 b3409a-b340a4 558->563 564 b33fb9-b33fbf 558->564 561 b33f16 559->561 562 b33f18-b33f2b GetWindowLongW 559->562 560->559 561->562 566 b33f30-b33f53 GetWindowRect 562->566 567 b33f2d 562->567 564->563 568 b33fc5-b33fdd GetWindowTextW 564->568 566->552 567->566 569 b34004-b34009 568->569 570 b33fdf-b33ffe call b33884 SetWindowTextW 568->570 571 b34080-b3408f GetWindow 569->571 572 b3400b-b34079 GetWindowRect 569->572 570->569 571->563 575 b34091 571->575 572->571 575->558
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00B33E65
                                        • GetClientRect.USER32(?,?), ref: 00B33E71
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00B33F20
                                        • GetWindowRect.USER32(?,?), ref: 00B33F4D
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00B33F6C
                                        • SetWindowTextW.USER32(?,?), ref: 00B33F93
                                        • GetSystemMetrics.USER32(00000008), ref: 00B33F9B
                                        • GetWindow.USER32(?,00000005), ref: 00B33FA6
                                        • GetWindowTextW.USER32(00000000,?,00000400), ref: 00B33FD1
                                        • SetWindowTextW.USER32(00000000,00000000), ref: 00B33FFE
                                        • GetWindowRect.USER32(00000000,?), ref: 00B34011
                                        • GetWindow.USER32(00000000,00000002), ref: 00B34083
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Window$RectText$ClientLongMetricsSystem
                                        • String ID: d
                                        • API String ID: 701536498-2564639436
                                        • Opcode ID: 5ff8f056681e52d698a09479740560c272ddda331947f1d9b539467194bb6ebd
                                        • Instruction ID: 8ed2737936516970353046907d3adca24b81f518a63f840890e69ffa2b61bdd6
                                        • Opcode Fuzzy Hash: 5ff8f056681e52d698a09479740560c272ddda331947f1d9b539467194bb6ebd
                                        • Instruction Fuzzy Hash: 3C716972208300AFD714DF68CD88F6BBBE9FB88714F54495DFA8593290DB74E9098B52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetDlgItem.USER32(00000068,00B858F8), ref: 00B3DF47
                                        • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,00B3BBE6,00000001,?,?,00B3C3B4,00B53090,00B858F8,00B858F8), ref: 00B3DF72
                                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00B3DF81
                                        • SendMessageW.USER32(00000000,000000C2,00000000,00B52310), ref: 00B3DF8B
                                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00B3DFA1
                                        • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00B3DFB7
                                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00B3DFF7
                                        • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00B3E001
                                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00B3E010
                                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00B3E033
                                        • SendMessageW.USER32(00000000,000000C2,00000000,00B53018), ref: 00B3E03E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: MessageSend$ItemShowWindow
                                        • String ID: \
                                        • API String ID: 1207805008-2967466578
                                        • Opcode ID: 131f98a4dcc0e57a2ddafb2c536657154f9c1881abf2eff2607c895da000f2af
                                        • Instruction ID: e558cec311584133920457b03f56504cefcc6227a95e348938e019e8c5f2b8fd
                                        • Opcode Fuzzy Hash: 131f98a4dcc0e57a2ddafb2c536657154f9c1881abf2eff2607c895da000f2af
                                        • Instruction Fuzzy Hash: 332146712857443EE311EB249C85FAB7FDCDF82710F100518FA90A71D1CBA54A098ABB
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 997 b3e1d2-b3e1ea call b3f4b0 1000 b3e1f0-b3e1fc call b44975 997->1000 1001 b3e3f9-b3e401 997->1001 1000->1001 1004 b3e202-b3e22e call b40480 1000->1004 1007 b3e232-b3e23b 1004->1007 1008 b3e230 1004->1008 1009 b3e27b 1007->1009 1010 b3e23d-b3e241 1007->1010 1008->1007 1011 b3e27f-b3e281 1009->1011 1012 b3e242-b3e245 1010->1012 1013 b3e283-b3e286 1011->1013 1014 b3e288-b3e28f 1011->1014 1015 b3e247 1012->1015 1016 b3e25c-b3e260 1012->1016 1013->1014 1019 b3e2a2-b3e2b4 call b332a5 1013->1019 1014->1019 1020 b3e291-b3e298 1014->1020 1021 b3e24f-b3e254 1015->1021 1017 b3e3d0-b3e3d2 1016->1017 1018 b3e266-b3e26c 1016->1018 1024 b3e3d6-b3e3de 1017->1024 1025 b3e272-b3e279 1018->1025 1026 b3e3ca-b3e3ce 1018->1026 1031 b3e2b6-b3e2c3 call b35644 1019->1031 1032 b3e2cd-b3e2d8 call b32578 1019->1032 1020->1019 1027 b3e29a 1020->1027 1022 b3e256 1021->1022 1023 b3e249-b3e24d 1021->1023 1022->1016 1023->1021 1029 b3e258 1023->1029 1024->1011 1025->1009 1025->1012 1026->1017 1026->1024 1027->1019 1029->1016 1031->1032 1037 b3e2c5 1031->1037 1038 b3e2f5-b3e302 ShellExecuteExW 1032->1038 1039 b3e2da-b3e2f1 call b3302e 1032->1039 1037->1032 1041 b3e3f7-b3e3f8 1038->1041 1042 b3e308-b3e31b 1038->1042 1039->1038 1041->1001 1044 b3e32e-b3e330 1042->1044 1045 b3e31d-b3e324 1042->1045 1047 b3e343-b3e362 call b3e652 1044->1047 1048 b3e332-b3e33b 1044->1048 1045->1044 1046 b3e326-b3e32c 1045->1046 1046->1044 1049 b3e38d-b3e399 CloseHandle 1046->1049 1047->1049 1063 b3e364-b3e375 GetExitCodeProcess 1047->1063 1048->1047 1054 b3e33d-b3e341 ShowWindow 1048->1054 1052 b3e39b-b3e3a8 call b35644 1049->1052 1053 b3e3aa-b3e3b8 1049->1053 1052->1053 1065 b3e3e3 1052->1065 1057 b3e3ea-b3e3ec 1053->1057 1058 b3e3ba-b3e3bc 1053->1058 1054->1047 1057->1041 1061 b3e3ee-b3e3f0 1057->1061 1058->1057 1059 b3e3be-b3e3c8 1058->1059 1059->1057 1061->1041 1064 b3e3f2-b3e3f5 ShowWindow 1061->1064 1063->1049 1066 b3e377-b3e386 1063->1066 1064->1041 1065->1057 1066->1049 1067 b3e388 1066->1067 1067->1049
                                        APIs
                                        • _wcslen.LIBCMT ref: 00B3E1F1
                                        • ShellExecuteExW.SHELL32(?), ref: 00B3E2FA
                                        • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 00B3E33F
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00B3E36D
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B3E391
                                        • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 00B3E3F5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                        • String ID: .exe$.inf
                                        • API String ID: 36480843-3750412487
                                        • Opcode ID: d070178d724fe697114993c5164d9c007a978c5b143903023e64f372eb61a1cf
                                        • Instruction ID: 9ec1b24e097633166c4e2bdccd456800e406adb7e8c6d4ca1bbff75fe71440fa
                                        • Opcode Fuzzy Hash: d070178d724fe697114993c5164d9c007a978c5b143903023e64f372eb61a1cf
                                        • Instruction Fuzzy Hash: 385102315043819ADB329F24CC40ABBB7E8EF80744F28049FE4E1971E1EBB1D988DB56
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1068 b33a2c-b33a60 call b3f484 call b3f4b0 call b40a1e 1075 b33a62-b33a80 GetModuleFileNameW call b40bfb 1068->1075 1076 b33a89-b33ab8 call b44953 call b31bab call b31f07 1068->1076 1081 b33d16-b33d26 1075->1081 1082 b33a86 1075->1082 1087 b33d0b-b33d11 call b31be1 1076->1087 1088 b33abe-b33ac7 1076->1088 1082->1076 1087->1081 1090 b33aca-b33acd 1088->1090 1091 b33ad3-b33b05 call b32286 call b320a8 1090->1091 1092 b33bfb-b33c1b call b3217b call b45ebb 1090->1092 1102 b33bc4-b33bc7 1091->1102 1103 b33b0b-b33b13 1091->1103 1092->1087 1101 b33c21-b33c3a call b320a8 1092->1101 1115 b33c43-b33c55 call b45ebb 1101->1115 1116 b33c3c-b33c41 1101->1116 1107 b33bca-b33bec call b3217b 1102->1107 1105 b33b15-b33b1d 1103->1105 1106 b33b3e-b33b49 1103->1106 1105->1106 1109 b33b1f-b33b39 call b45ed0 1105->1109 1110 b33b74-b33b7c 1106->1110 1111 b33b4b-b33b57 1106->1111 1107->1090 1126 b33bf2-b33bf5 1107->1126 1131 b33b3b 1109->1131 1132 b33bba-b33bc2 1109->1132 1113 b33ba8-b33bac 1110->1113 1114 b33b7e-b33b86 1110->1114 1111->1110 1118 b33b59-b33b5e 1111->1118 1113->1102 1121 b33bae-b33bb1 1113->1121 1114->1113 1120 b33b88-b33ba2 call b45ed0 1114->1120 1115->1087 1137 b33c5b-b33c78 call b35386 call b44990 1115->1137 1122 b33c7a-b33c82 1116->1122 1118->1110 1125 b33b60-b33b72 call b45d79 1118->1125 1120->1087 1120->1113 1121->1103 1127 b33c87-b33c94 1122->1127 1128 b33c84 1122->1128 1125->1110 1139 b33bb6 1125->1139 1126->1087 1126->1092 1134 b33d00-b33d08 1127->1134 1135 b33c96-b33c98 1127->1135 1128->1127 1131->1106 1132->1107 1134->1087 1140 b33c99-b33ca3 1135->1140 1137->1122 1139->1132 1140->1134 1142 b33ca5-b33ca9 1140->1142 1144 b33ce3-b33ce6 1142->1144 1145 b33cab-b33cb2 1142->1145 1147 b33cf0-b33cf2 1144->1147 1148 b33ce8-b33cee 1144->1148 1149 b33cb4-b33cb7 1145->1149 1150 b33cd9 1145->1150 1152 b33cf3 1147->1152 1148->1147 1148->1152 1153 b33cd5-b33cd7 1149->1153 1154 b33cb9-b33cbc 1149->1154 1155 b33cdb-b33ce1 1150->1155 1156 b33cf7-b33cfe 1152->1156 1153->1155 1157 b33cd1-b33cd3 1154->1157 1158 b33cbe-b33cc1 1154->1158 1155->1156 1156->1134 1156->1140 1157->1155 1159 b33cc3-b33cc7 1158->1159 1160 b33ccd-b33ccf 1158->1160 1159->1152 1161 b33cc9-b33ccb 1159->1161 1160->1155 1161->1155
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00B33A31
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00B33A13,?), ref: 00B33A69
                                        • _wcsrchr.LIBVCRUNTIME ref: 00B33A77
                                          • Part of subcall function 00B35386: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00B333D2,00000000,?,?), ref: 00B353A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ByteCharFileH_prologModuleMultiNameWide_wcsrchr
                                        • String ID: *messages***$*messages***$R$a
                                        • API String ID: 2549165012-2900423073
                                        • Opcode ID: f3afbc11756ec12de060ddea75a4b6972ff25e61f923b71694c5c66c81471c65
                                        • Instruction ID: 5b4f152f2cf5259e0d8bcb92d7f01d7f4415bac823b9223b00eb83c05616b1c4
                                        • Opcode Fuzzy Hash: f3afbc11756ec12de060ddea75a4b6972ff25e61f923b71694c5c66c81471c65
                                        • Instruction Fuzzy Hash: 57911872A006059BDB34DB68CC91BAFB7E8EF40B10F3445EAE545A72D1EB709B84CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1162 b49db5-b49dce 1163 b49de4-b49de9 1162->1163 1164 b49dd0-b49de0 call b4e3cc 1162->1164 1166 b49df6-b49e1a MultiByteToWideChar 1163->1166 1167 b49deb-b49df3 1163->1167 1164->1163 1174 b49de2 1164->1174 1169 b49e20-b49e2c 1166->1169 1170 b49fad-b49fc0 call b3fcf1 1166->1170 1167->1166 1171 b49e80 1169->1171 1172 b49e2e-b49e3f 1169->1172 1178 b49e82-b49e84 1171->1178 1175 b49e41-b49e50 call b51ba0 1172->1175 1176 b49e5e-b49e6f call b4846d 1172->1176 1174->1163 1181 b49fa2 1175->1181 1187 b49e56-b49e5c 1175->1187 1176->1181 1188 b49e75 1176->1188 1178->1181 1182 b49e8a-b49e9d MultiByteToWideChar 1178->1182 1186 b49fa4-b49fab call b4a01d 1181->1186 1182->1181 1185 b49ea3-b49eb5 call b4a479 1182->1185 1193 b49eba-b49ebe 1185->1193 1186->1170 1192 b49e7b-b49e7e 1187->1192 1188->1192 1192->1178 1193->1181 1194 b49ec4-b49ecb 1193->1194 1195 b49f05-b49f11 1194->1195 1196 b49ecd-b49ed2 1194->1196 1198 b49f13-b49f24 1195->1198 1199 b49f5d 1195->1199 1196->1186 1197 b49ed8-b49eda 1196->1197 1197->1181 1200 b49ee0-b49efa call b4a479 1197->1200 1202 b49f26-b49f35 call b51ba0 1198->1202 1203 b49f3f-b49f50 call b4846d 1198->1203 1201 b49f5f-b49f61 1199->1201 1200->1186 1215 b49f00 1200->1215 1205 b49f63-b49f7c call b4a479 1201->1205 1206 b49f9b-b49fa1 call b4a01d 1201->1206 1202->1206 1218 b49f37-b49f3d 1202->1218 1203->1206 1214 b49f52 1203->1214 1205->1206 1220 b49f7e-b49f85 1205->1220 1206->1181 1219 b49f58-b49f5b 1214->1219 1215->1181 1218->1219 1219->1201 1221 b49f87-b49f88 1220->1221 1222 b49fc1-b49fc7 1220->1222 1223 b49f89-b49f99 WideCharToMultiByte 1221->1223 1222->1223 1223->1206 1224 b49fc9-b49fd0 call b4a01d 1223->1224 1224->1186
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00B4579C,00B4579C,?,?,?,00B4A006,00000001,00000001,23E85006), ref: 00B49E0F
                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00B4A006,00000001,00000001,23E85006,?,?,?), ref: 00B49E95
                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B49F8F
                                        • __freea.LIBCMT ref: 00B49F9C
                                          • Part of subcall function 00B4846D: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B44B84,?,0000015D,?,?,?,?,00B45703,000000FF,00000000,?,?), ref: 00B4849F
                                        • __freea.LIBCMT ref: 00B49FA5
                                        • __freea.LIBCMT ref: 00B49FCA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                        • String ID:
                                        • API String ID: 1414292761-0
                                        • Opcode ID: 9698d89271b7cc8e167030f519ee20e96b0e42f957a5ca4b5eb5d8a4d1d1aed8
                                        • Instruction ID: b784091880633259b1c79554e203c6cff50335e7b37cd3d963c376ccac4a7880
                                        • Opcode Fuzzy Hash: 9698d89271b7cc8e167030f519ee20e96b0e42f957a5ca4b5eb5d8a4d1d1aed8
                                        • Instruction Fuzzy Hash: 7851D072610216AFDB258FA4CC81EBF77E9EB44750F1546A9FC04D7140EB35EE48E690
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1227 b34e15-b34e6e SystemTimeToFileTime 1228 b34f04-b34f08 1227->1228 1229 b34e74-b34e80 1227->1229 1232 b34f0b-b34f11 1228->1232 1230 b34e82 1229->1230 1231 b34e85-b34e8f call b32b7c 1229->1231 1230->1231 1235 b34e91-b34ea5 LocalFileTimeToFileTime 1231->1235 1236 b34ea7-b34efa FileTimeToSystemTime TzSpecificLocalTimeToSystemTime SystemTimeToFileTime * 2 1231->1236 1237 b34efd-b34f02 1235->1237 1236->1237 1237->1232
                                        APIs
                                        • SystemTimeToFileTime.KERNEL32(?,00B34E0F), ref: 00B34E6A
                                        • LocalFileTimeToFileTime.KERNEL32(00B34E0F,?), ref: 00B34E99
                                        • FileTimeToSystemTime.KERNEL32(00B34E0F,?), ref: 00B34EAF
                                        • TzSpecificLocalTimeToSystemTime.KERNELBASE(00000000,?,?), ref: 00B34EC0
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B34ECE
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B34ED8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Time$File$System$Local$Specific
                                        • String ID:
                                        • API String ID: 3144155402-0
                                        • Opcode ID: 8f3b8f1e95f2000b9537014632cd6b3f59dcabe9b47bb6953e745c12f433efba
                                        • Instruction ID: feda4acb3c5d7eb6b80b7c4652e3bbefe753732df373234fa98919df4d765b1a
                                        • Opcode Fuzzy Hash: 8f3b8f1e95f2000b9537014632cd6b3f59dcabe9b47bb6953e745c12f433efba
                                        • Instruction Fuzzy Hash: A6310A7A900219EBCB04DFE8C8809EFF7B8FF48700F14455AE956E3200E730A945CBA8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1266 b3b97d-b3b99c GetClassNameW 1267 b3b9c4-b3b9c6 1266->1267 1268 b3b99e-b3b9b3 call b35644 1266->1268 1270 b3b9d1-b3b9d5 1267->1270 1271 b3b9c8-b3b9cb SHAutoComplete 1267->1271 1273 b3b9c3 1268->1273 1274 b3b9b5-b3b9c1 FindWindowExW 1268->1274 1271->1270 1273->1267 1274->1273
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000050), ref: 00B3B994
                                        • SHAutoComplete.SHLWAPI(?,00000010), ref: 00B3B9CB
                                          • Part of subcall function 00B35644: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B32EC7,?,?,?,00B32E74,?,-00000002,?,00000000,?), ref: 00B3565A
                                        • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00B3B9BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                                        • String ID: EDIT
                                        • API String ID: 4243998846-3080729518
                                        • Opcode ID: b344120dbdad843cd39eaaff3c2e5700d67a74bf925106f1e5821024512e18bc
                                        • Instruction ID: b28d93e9e4ec7a8c0953d1cf35054400d7e2dc339ead5e4eb8f78951a3beda7e
                                        • Opcode Fuzzy Hash: b344120dbdad843cd39eaaff3c2e5700d67a74bf925106f1e5821024512e18bc
                                        • Instruction Fuzzy Hash: 71F0823260272877D73056659C05FAB77ACEF46B51F5401D5BF04A7184DB60A9018AF6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1275 b3e5c3-b3e5f7 call b3f4b0 SetEnvironmentVariableW call b3439f 1280 b3e61b-b3e61f 1275->1280 1281 b3e5f9-b3e5fd 1275->1281 1282 b3e606-b3e60d call b34496 1281->1282 1285 b3e5ff-b3e605 1282->1285 1286 b3e60f-b3e615 SetEnvironmentVariableW 1282->1286 1285->1282 1286->1280
                                        APIs
                                        • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 00B3E5D9
                                        • SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00B3E615
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: sfxcmd$sfxpar
                                        • API String ID: 1431749950-3493335439
                                        • Opcode ID: 28948883da3c787d290bc3cb564689ed88feb1ba92acaaf635008723a4059af2
                                        • Instruction ID: d8b2a6ed7efaaa6e1d80591c94800a74635094cf3788ae1cbd242cf7eab0f03c
                                        • Opcode Fuzzy Hash: 28948883da3c787d290bc3cb564689ed88feb1ba92acaaf635008723a4059af2
                                        • Instruction Fuzzy Hash: 28F0A772402324E6D7212B948C4ABBA77DCDF19B92F1040D6FC4597291DA61DD40D6B1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1287 b3b9eb-b3ba30 call b347aa OleInitialize SHGetMalloc
                                        APIs
                                          • Part of subcall function 00B347AA: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B347C5
                                          • Part of subcall function 00B347AA: LoadLibraryW.KERNELBASE(?,?,00B341B6,Crypt32.dll,?,00B34239,?,00B3421C,?,?,?,?), ref: 00B347E7
                                        • OleInitialize.OLE32(00000000), ref: 00B3BA01
                                        • SHGetMalloc.SHELL32(00B711B0), ref: 00B3BA24
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: DirectoryInitializeLibraryLoadMallocSystem
                                        • String ID: riched20.dll$3Qo
                                        • API String ID: 1045004029-4232643773
                                        • Opcode ID: 4c823ab2e2dc77e02467b814baf960d24d44ec7deb4cb9acf09730de0ccddd71
                                        • Instruction ID: 7d0b13b0a82e3368ff87a93ce0710efceb13b508a7b66074098cab4f6ba8725b
                                        • Opcode Fuzzy Hash: 4c823ab2e2dc77e02467b814baf960d24d44ec7deb4cb9acf09730de0ccddd71
                                        • Instruction Fuzzy Hash: 0DE04F71641318ABD7105FA4DC0EF597BFCEB05716F0041E9F949A7250DFB569048BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1291 b31f07-b31f28 call b3f4b0 1294 b31f31 1291->1294 1295 b31f2a-b31f2f 1291->1295 1296 b31f33-b31f50 1294->1296 1295->1294 1295->1296 1297 b31f52 1296->1297 1298 b31f58-b31f62 1296->1298 1297->1298 1299 b31f67-b31f92 CreateFileW 1298->1299 1300 b31f64 1298->1300 1301 b31ff6-b3200a 1299->1301 1302 b31f94-b31fb6 GetLastError call b333ec 1299->1302 1300->1299 1303 b32024-b3202f 1301->1303 1304 b3200c-b3201f call b345c8 1301->1304 1308 b31fe5-b31fea 1302->1308 1309 b31fb8-b31fda CreateFileW GetLastError 1302->1309 1304->1303 1308->1301 1310 b31fec 1308->1310 1311 b31fe0-b31fe3 1309->1311 1312 b31fdc 1309->1312 1310->1301 1311->1301 1311->1308 1312->1311
                                        APIs
                                        • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000), ref: 00B31F87
                                        • GetLastError.KERNEL32(?,?,00000000,00000003,-00000001,00000000), ref: 00B31F94
                                        • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00B31FC9
                                        • GetLastError.KERNEL32(?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00B31FD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CreateErrorFileLast
                                        • String ID:
                                        • API String ID: 1214770103-0
                                        • Opcode ID: 5bd0532e5853d21f418be7f906391c10a1f6c2d533c131c86ada2798438c3454
                                        • Instruction ID: 563b3b4759f1949dd42493dbeccdc85693b60f31fd85bd4826bb0e7855cb5621
                                        • Opcode Fuzzy Hash: 5bd0532e5853d21f418be7f906391c10a1f6c2d533c131c86ada2798438c3454
                                        • Instruction Fuzzy Hash: 203158718413416FE3219B288C45BEBBBE8FB45364F244A59FD90872C1D7B59988CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1313 b31df7-b31e03 1314 b31e10-b31e27 ReadFile 1313->1314 1315 b31e05-b31e0d GetStdHandle 1313->1315 1316 b31e83 1314->1316 1317 b31e29-b31e32 call b31ee4 1314->1317 1315->1314 1318 b31e86-b31e8b 1316->1318 1321 b31e34-b31e3c 1317->1321 1322 b31e4b-b31e4f 1317->1322 1321->1322 1323 b31e3e 1321->1323 1324 b31e51-b31e5a GetLastError 1322->1324 1325 b31e60-b31e64 1322->1325 1326 b31e3f-b31e49 call b31df7 1323->1326 1324->1325 1327 b31e5c-b31e5e 1324->1327 1328 b31e66-b31e6e 1325->1328 1329 b31e7e-b31e81 1325->1329 1326->1318 1327->1318 1328->1329 1331 b31e70-b31e79 GetLastError 1328->1331 1329->1318 1331->1329 1333 b31e7b-b31e7c 1331->1333 1333->1326
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 00B31E07
                                        • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00B31E1F
                                        • GetLastError.KERNEL32 ref: 00B31E51
                                        • GetLastError.KERNEL32 ref: 00B31E70
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FileHandleRead
                                        • String ID:
                                        • API String ID: 2244327787-0
                                        • Opcode ID: 0f17f79aa5194755a4eb193b1e7a786a1310e24c4198b6567a973dddebb1e20d
                                        • Instruction ID: 29bbeed399823d27859289c9e6b27ae141330fe0ad8c10f65f1b7b146ad9c80b
                                        • Opcode Fuzzy Hash: 0f17f79aa5194755a4eb193b1e7a786a1310e24c4198b6567a973dddebb1e20d
                                        • Instruction Fuzzy Hash: 28118230501228EFDB209BA8C944A6A77EDEB05762F208DAAFD1686190DB339D50DB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00B449ED,00000000,00000000,?,00B4A1E8,00B449ED,00000000,00000000,00000000,?,00B4A3E5,00000006,FlsSetValue), ref: 00B4A273
                                        • GetLastError.KERNEL32(?,00B4A1E8,00B449ED,00000000,00000000,00000000,?,00B4A3E5,00000006,FlsSetValue,00B554A0,00B554A8,00000000,00000364,?,00B48DF8), ref: 00B4A27F
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B4A1E8,00B449ED,00000000,00000000,00000000,?,00B4A3E5,00000006,FlsSetValue,00B554A0,00B554A8,00000000), ref: 00B4A28D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID:
                                        • API String ID: 3177248105-0
                                        • Opcode ID: 2f0dc8343d178bc19cdde237a0b9ebeee075967623498eb1b618b68352666ea3
                                        • Instruction ID: 8bd4c6146524603d7fe0245c1badfb7c795787bb5e1b114a3f398c7af9899177
                                        • Opcode Fuzzy Hash: 2f0dc8343d178bc19cdde237a0b9ebeee075967623498eb1b618b68352666ea3
                                        • Instruction Fuzzy Hash: 2F01FC327427229BC7214F78EC44F5777D8EF45B6171506A4F906D7180DB61D901E6E1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B3C22D
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B3C23E
                                        • TranslateMessage.USER32(?), ref: 00B3C248
                                        • DispatchMessageW.USER32(?), ref: 00B3C252
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Message$DispatchPeekTranslate
                                        • String ID:
                                        • API String ID: 4217535847-0
                                        • Opcode ID: 4226dff595ea1824c1013757b7b62a795cf5b4e0f07696f1e2828fffdbf5deac
                                        • Instruction ID: adc5e85dec10e9645f90ba2e272a8f1293f5c49e7593aa6555d64fa672a55118
                                        • Opcode Fuzzy Hash: 4226dff595ea1824c1013757b7b62a795cf5b4e0f07696f1e2828fffdbf5deac
                                        • Instruction Fuzzy Hash: ABE07DB2D0226EA78B20ABF6AC4DDEB7F7CEE46262B004591BA19D3110DB649505C7F0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prolog__allrem
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe$Cyber.exe
                                        • API String ID: 2283500502-2023509382
                                        • Opcode ID: 0b6a32c7c52828c4dfb9db94b4a862a9bf234b60779a8dc4c77abd676c58a286
                                        • Instruction ID: fc69da0ccb95ae7e794649f3d151fef21acaf85ac2f3bed40892598d3017cd06
                                        • Opcode Fuzzy Hash: 0b6a32c7c52828c4dfb9db94b4a862a9bf234b60779a8dc4c77abd676c58a286
                                        • Instruction Fuzzy Hash: 519174B1910319DEDB20EF65DD81BAA77E8FB08354F6040EAF948E7292DB749D44CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B3368A: _wcslen.LIBCMT ref: 00B33690
                                        • CreateDirectoryW.KERNELBASE(?,00000000,?), ref: 00B32634
                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?), ref: 00B32667
                                        • GetLastError.KERNEL32(?,?), ref: 00B32684
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CreateDirectory$ErrorLast_wcslen
                                        • String ID:
                                        • API String ID: 2260680371-0
                                        • Opcode ID: a3ddffbcd56c92d5357d29b2adeba760a48bc21dd2ed8b702896c59bbd670a13
                                        • Instruction ID: 025785d73285a176deaafa67e311a2677761f061e4b380859ac72ef44b0dec3b
                                        • Opcode Fuzzy Hash: a3ddffbcd56c92d5357d29b2adeba760a48bc21dd2ed8b702896c59bbd670a13
                                        • Instruction Fuzzy Hash: CD01D43251221466DF216B685C47BFF33DCDF1B781F3844D5F940E6091DF64A980CAA9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00B4AD58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Info
                                        • String ID:
                                        • API String ID: 1807457897-3916222277
                                        • Opcode ID: b6173b1ff13bce65f85c317f31f5bd6a5a37380fec751fd09030a78c36a8e49a
                                        • Instruction ID: 3647b7616c202a5618438327d0c536c2d9ff0173a6e65023aaa7dc1bcdf8ada6
                                        • Opcode Fuzzy Hash: b6173b1ff13bce65f85c317f31f5bd6a5a37380fec751fd09030a78c36a8e49a
                                        • Instruction Fuzzy Hash: F9412A709443889EDB228E648C84BF6BBFEDB45704F2404ECE59A87142D235AB45EF21
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,23E85006,00000001,?,000000FF), ref: 00B4A4EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: String
                                        • String ID: LCMapStringEx
                                        • API String ID: 2568140703-3893581201
                                        • Opcode ID: 090d08e182263bee65f96fa75a9ccc2a2fd4faea712fe4a7958bf8cb10eae8d0
                                        • Instruction ID: ff24ce558d60fc01ae17e8f1ad537b428c2c2d3d2ab8bfe78680ce4c6b512d77
                                        • Opcode Fuzzy Hash: 090d08e182263bee65f96fa75a9ccc2a2fd4faea712fe4a7958bf8cb10eae8d0
                                        • Instruction Fuzzy Hash: CD014C3254020DBBDF125F90DC05EEE3FA2EF48722F014094FE1826260CA728A71FB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00B3E468
                                          • Part of subcall function 00B3468A: _wcslen.LIBCMT ref: 00B346A0
                                          • Part of subcall function 00B3A446: __EH_prolog.LIBCMT ref: 00B3A44B
                                        Strings
                                        • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, xrefs: 00B3E497
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prolog$_wcslen
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                        • API String ID: 2838827086-3224907921
                                        • Opcode ID: 13d6484b9778ffc3062818042aa12d926092e097a7545b79b31c6aa723a33318
                                        • Instruction ID: bb309a5cf3c4e9719b59003e0a6600cbfde0e4ad8655c687e62b91f33a2e61dd
                                        • Opcode Fuzzy Hash: 13d6484b9778ffc3062818042aa12d926092e097a7545b79b31c6aa723a33318
                                        • Instruction Fuzzy Hash: 8D01F572549240AED300AB68AC167AA7FE4D725720F1040DFE858573B2DFB21644DB36
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00B49AA1), ref: 00B4A462
                                        Strings
                                        • InitializeCriticalSectionEx, xrefs: 00B4A432
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpin
                                        • String ID: InitializeCriticalSectionEx
                                        • API String ID: 2593887523-3084827643
                                        • Opcode ID: 96a09933fbc548533101b3f3bd46a7284c83b10a5a469a249c9fe13c9ef68378
                                        • Instruction ID: 8f0eae110f7589bcdcfadfda162a60ed2f6e32598077e2f036e427010c4814fa
                                        • Opcode Fuzzy Hash: 96a09933fbc548533101b3f3bd46a7284c83b10a5a469a249c9fe13c9ef68378
                                        • Instruction Fuzzy Hash: 47F09A31681318BBCB116F54CC05EAE7FE1EF49B22B0080E4FD092A260CE714A51EB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Alloc
                                        • String ID: FlsAlloc
                                        • API String ID: 2773662609-671089009
                                        • Opcode ID: 823b070fddac34ae0cd639f8d90f3e4cbbc02a18d4d69a94b89e311d38e72fad
                                        • Instruction ID: af4c2d3b98ecba5eb980e6e19c72e85feacc2835684a767dc305c99b6be1514f
                                        • Opcode Fuzzy Hash: 823b070fddac34ae0cd639f8d90f3e4cbbc02a18d4d69a94b89e311d38e72fad
                                        • Instruction Fuzzy Hash: 71E0E570A85718BB9310AF649C12E7EBBD4DB59B23F4001D5FC0967350DE611F41A6D6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • try_get_function.LIBVCRUNTIME ref: 00B4450E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: try_get_function
                                        • String ID: FlsAlloc
                                        • API String ID: 2742660187-671089009
                                        • Opcode ID: 215337b7e8cc92f62e49aba58583cc0acfa7c158f913f22186560f8011a00a6d
                                        • Instruction ID: 4d21922a91ef8c160f21e14793e88ea37c180bc32dca937cc3ed2990f74764b0
                                        • Opcode Fuzzy Hash: 215337b7e8cc92f62e49aba58583cc0acfa7c158f913f22186560f8011a00a6d
                                        • Instruction Fuzzy Hash: 71D012A1B8172867951036A45C02FAAFAC4D608FE3F0400D2FF086575195A24B3465D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EB7D
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID: 3Qo
                                        • API String ID: 1269201914-1944013411
                                        • Opcode ID: c3cd901740a89b0892b74e70bf4bcda27b3418a8a44af3b9b9fd077564215371
                                        • Instruction ID: c5af3aa6dbf38c01354b9c1253b37ae1f64d4c80e121cd74770873509a7ee3e5
                                        • Opcode Fuzzy Hash: c3cd901740a89b0892b74e70bf4bcda27b3418a8a44af3b9b9fd077564215371
                                        • Instruction Fuzzy Hash: 32B01286259202FC361513147D46E3611DCC5C0F12B3081EBBC01F80C0B8404C081132
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B4AC5B: GetOEMCP.KERNEL32(00000000,?,?,00B4AEE4,?), ref: 00B4AC86
                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00B4AF29,?,00000000), ref: 00B4B0FC
                                        • GetCPInfo.KERNEL32(00000000,00B4AF29,?,?,?,00B4AF29,?,00000000), ref: 00B4B10F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CodeInfoPageValid
                                        • String ID:
                                        • API String ID: 546120528-0
                                        • Opcode ID: d0933d036681bd4eb4a825814c20c2e508714cac55a92d2bdd563167ce715ca4
                                        • Instruction ID: 0d7f5e1108c6df90dee573311fb97b40ca59c9baa060d0ac9579f0cf04719f8f
                                        • Opcode Fuzzy Hash: d0933d036681bd4eb4a825814c20c2e508714cac55a92d2bdd563167ce715ca4
                                        • Instruction Fuzzy Hash: E1514070A042459FDB24CF25C891EBBBBE5EF01300F1484EEE2969B252D774DB42EB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B48D26: GetLastError.KERNEL32(?,?,00B44E4E,?,00000000,?,00B449ED,00000200,00000000,?), ref: 00B48D2A
                                          • Part of subcall function 00B48D26: _free.LIBCMT ref: 00B48D5D
                                          • Part of subcall function 00B48D26: SetLastError.KERNEL32(00000000,00000000,?), ref: 00B48D9E
                                          • Part of subcall function 00B48D26: _abort.LIBCMT ref: 00B48DA4
                                          • Part of subcall function 00B4AFE6: _abort.LIBCMT ref: 00B4B018
                                          • Part of subcall function 00B4AFE6: _free.LIBCMT ref: 00B4B04C
                                          • Part of subcall function 00B4AC5B: GetOEMCP.KERNEL32(00000000,?,?,00B4AEE4,?), ref: 00B4AC86
                                        • _free.LIBCMT ref: 00B4AF3F
                                        • _free.LIBCMT ref: 00B4AF75
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorLast_abort
                                        • String ID:
                                        • API String ID: 2991157371-0
                                        • Opcode ID: 8473b1be0659c37d3a3da07b0c7fde7538352c41c94a1e20779f1ed2005611d7
                                        • Instruction ID: d3a10d7ac2b4a5df6eca51f45d7fc4eaa5a21a8ad599f7ef2bd698bed94cff15
                                        • Opcode Fuzzy Hash: 8473b1be0659c37d3a3da07b0c7fde7538352c41c94a1e20779f1ed2005611d7
                                        • Instruction Fuzzy Hash: EF31B171944208AFDB10EFA8D881BADBBF4EF41321F2540D9F4149B291EB329F45EB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNELBASE(?,-C0000001,?,00000000,00000002,00000000,00000000,?), ref: 00B31D4E
                                        • CreateFileW.KERNEL32(?,-C0000001,?,00000000,00000002,00000000,00000000,?,?,00000800,?), ref: 00B31D8F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: a5f9af9fe22be207d8f5b4221a5b6ee9cfc9db3374a051b871481202dfa1bde1
                                        • Instruction ID: 82054040a44ba8cdc5dcb953df5c9751e8f98279da7af4fe2e25f79983e5bfe3
                                        • Opcode Fuzzy Hash: a5f9af9fe22be207d8f5b4221a5b6ee9cfc9db3374a051b871481202dfa1bde1
                                        • Instruction Fuzzy Hash: 8C21E471444744AFE7308F28CC85BB7BBECDB05324F208E69F9E5C6190D77499489B61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00B32370
                                        • WriteFile.KERNELBASE(?), ref: 00B3239D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: f7c8865a252b97ac8adae6c9886abf82f72248a695008aed30585b52972a167d
                                        • Instruction ID: 7e340b90b37fc6c6a197e26b9a9b486b556bc83608795c412d409c5b482e081b
                                        • Opcode Fuzzy Hash: f7c8865a252b97ac8adae6c9886abf82f72248a695008aed30585b52972a167d
                                        • Instruction Fuzzy Hash: CA216A71144206AFEB208F24CC49BAAB7E8FB40300F244969F599971C1CB38F889CBE5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FlushFileBuffers.KERNEL32(?), ref: 00B321C7
                                        • SetFileTime.KERNELBASE(?,?,?,?), ref: 00B32277
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: File$BuffersFlushTime
                                        • String ID:
                                        • API String ID: 1392018926-0
                                        • Opcode ID: d568e83c7c1aa258d3fdfc15b5a82c6487838911ee218a9fd679bb61b4029e04
                                        • Instruction ID: 1fde0bc197c810dc1ad9ab71052886ba41fd4eeb66ca9c0a0477a964ad405648
                                        • Opcode Fuzzy Hash: d568e83c7c1aa258d3fdfc15b5a82c6487838911ee218a9fd679bb61b4029e04
                                        • Instruction Fuzzy Hash: 8021BF31259295ABC715DF24CD81EABBBD4EF96304F18099DB8C187151D725ED0CC7A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B4A205
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B4A212
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressProc__crt_fast_encode_pointer
                                        • String ID:
                                        • API String ID: 2279764990-0
                                        • Opcode ID: eaef9e2570d20a052416970eaf58034df972504587a7c82be740e184b50bfcb8
                                        • Instruction ID: a320ca7294eace9db00a3b420f8f7d9d440a91820bb743828363fb74ed597ee7
                                        • Opcode Fuzzy Hash: eaef9e2570d20a052416970eaf58034df972504587a7c82be740e184b50bfcb8
                                        • Instruction Fuzzy Hash: A1110A33A40621AF9B259E28EC4096B73D5EB8532071A02A0FC15BB284DB31EE41F7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00B322BC
                                        • GetLastError.KERNEL32 ref: 00B322C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastPointer
                                        • String ID:
                                        • API String ID: 2976181284-0
                                        • Opcode ID: ebf5608864e33db3b9b9b9fcd632551071009777d283833e4484af16344c9a5a
                                        • Instruction ID: 81fb2ea030ed0153ac4448f511cb79cb93e81d132a80b302baceda86c05f8e10
                                        • Opcode Fuzzy Hash: ebf5608864e33db3b9b9b9fcd632551071009777d283833e4484af16344c9a5a
                                        • Instruction Fuzzy Hash: B5019EB17023406BEB349B29CC84B6BB6D9EB85316F2449BEB152C36C0DA71DC08D621
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 00B32086
                                        • GetLastError.KERNEL32 ref: 00B32093
                                          • Part of subcall function 00B31E8E: __EH_prolog.LIBCMT ref: 00B31E93
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorFileH_prologLastPointer
                                        • String ID:
                                        • API String ID: 4236474358-0
                                        • Opcode ID: 9779116e1c8669f53723ac8b72f23e5de793992aa100394fd778c1c8d1302227
                                        • Instruction ID: 297e198e30945c4c254656fd6ea3621736d8622454ae9e2faf57b51b584973c1
                                        • Opcode Fuzzy Hash: 9779116e1c8669f53723ac8b72f23e5de793992aa100394fd778c1c8d1302227
                                        • Instruction Fuzzy Hash: 7201B5366012109B9B1C8F59CC84AAB77D9FF95721B344299FC268B291DB71D809D760
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadStringW.USER32(?,?,00000200,?), ref: 00B340EC
                                        • LoadStringW.USER32(?,?,00000200,?), ref: 00B34102
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: LoadString
                                        • String ID:
                                        • API String ID: 2948472770-0
                                        • Opcode ID: 34f72958ba7707569489faa16f64fbd5dca09362b4914714a655c3a0f53ddb70
                                        • Instruction ID: 10eb6400017ad7a8b0591743c06d5c62230dc13ba4338612ff03845945b32c7d
                                        • Opcode Fuzzy Hash: 34f72958ba7707569489faa16f64fbd5dca09362b4914714a655c3a0f53ddb70
                                        • Instruction Fuzzy Hash: ABF0F6727003287BDA219F20AC44F6B7FEDDB19782F1104B5FE48A7461DE215C4197A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFileAttributesW.KERNELBASE(?,00000000,?,?,00B32680,?,?), ref: 00B3285E
                                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,?,00B32680,?,?), ref: 00B3288F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 33a811e4f22819d415131cd4654441fef1785f1a86206904a5ed8274a3a40fbf
                                        • Instruction ID: b997b3beb4fbd4021a78cf45b48c9a8d1f9cb651f6c49124aa788f035c03ab12
                                        • Opcode Fuzzy Hash: 33a811e4f22819d415131cd4654441fef1785f1a86206904a5ed8274a3a40fbf
                                        • Instruction Fuzzy Hash: 64F01C322822096ADB115F649C01BE977ACBF15782F4480A1B98896161DA3299949A54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ItemText_swprintf
                                        • String ID:
                                        • API String ID: 3011073432-0
                                        • Opcode ID: 690a134658c4e237099cebc7d89aefd04234dd00e622005bcadf1d584fa20141
                                        • Instruction ID: 408e2eda6566a44a88eecb5b55c24b536f028345e3ea7f9b1fd725cd52a00962
                                        • Opcode Fuzzy Hash: 690a134658c4e237099cebc7d89aefd04234dd00e622005bcadf1d584fa20141
                                        • Instruction Fuzzy Hash: 9EF0EC71E443486AD711A7A0DC06FAA3B9D9704742F2400E6B705671E2DE719A6147A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DeleteFileW.KERNELBASE(?,?,?,00B31DF5,?,?,00B31C16), ref: 00B32536
                                        • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00B31DF5,?,?,00B31C16), ref: 00B32564
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 10f9a05b5cd7214aaf34beb8594251a52e56ca6716617ee7768a83eb2243f1b6
                                        • Instruction ID: caa78ac39464161cfd64fe387924169b1d247a3ca75980f6a07542783f9861eb
                                        • Opcode Fuzzy Hash: 10f9a05b5cd7214aaf34beb8594251a52e56ca6716617ee7768a83eb2243f1b6
                                        • Instruction Fuzzy Hash: 82E09232552209ABDB009F65DC01BEA77ECFB157C2F5880E1BC84C31A5DF22DE94DA64
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?), ref: 00B3259D
                                        • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 00B325C9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: fa2f5bba83fdc2a67e2cf6e7ad39ca126219c2ce97671380f15a65ea3642681c
                                        • Instruction ID: a5fea582267717daf682c5edcfac82fd3d420efaad0ea20e4038558db48284ba
                                        • Opcode Fuzzy Hash: fa2f5bba83fdc2a67e2cf6e7ad39ca126219c2ce97671380f15a65ea3642681c
                                        • Instruction Fuzzy Hash: D8E092329022285BCB10AB68DC04BE977ECEB197E2F0442E1FD48D3291DE719EC48AD4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B347C5
                                        • LoadLibraryW.KERNELBASE(?,?,00B341B6,Crypt32.dll,?,00B34239,?,00B3421C,?,?,?,?), ref: 00B347E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystem
                                        • String ID:
                                        • API String ID: 1175261203-0
                                        • Opcode ID: 097f903de8fac5912bd1f492fb0b3519d8e59d0a768d4dae7a76dd3b1f0edde4
                                        • Instruction ID: a6ac955ba9de8d3e74b65b2d2e4ad69919e08166338f67ea2be8917f60b22c68
                                        • Opcode Fuzzy Hash: 097f903de8fac5912bd1f492fb0b3519d8e59d0a768d4dae7a76dd3b1f0edde4
                                        • Instruction Fuzzy Hash: 0FE092728012586BCB10AB949C04FEB77ACEB09382F0400E1B948D3100DB749A80CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B444F9: try_get_function.LIBVCRUNTIME ref: 00B4450E
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B43433
                                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00B4343E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                        • String ID:
                                        • API String ID: 806969131-0
                                        • Opcode ID: a62869dd4d11f02c0b66c4aa9864b52b97efb58082c707f427a2cd4decbfa818
                                        • Instruction ID: 156e663ea4dc7e0a66f71e3f5ad2c25341d915662eb398181a33acd7bd1d3966
                                        • Opcode Fuzzy Hash: a62869dd4d11f02c0b66c4aa9864b52b97efb58082c707f427a2cd4decbfa818
                                        • Instruction Fuzzy Hash: 0BD0A920048304550C823AB438A3BD923C48932FB836C52DAE130A62E2EF1083013523
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ItemShowWindow
                                        • String ID:
                                        • API String ID: 3351165006-0
                                        • Opcode ID: 722e9875c7dc8f82bae3df37c9a801baf84a4a82c3e8a17b49ba3a82eb61578f
                                        • Instruction ID: 59a9aa27b857c8f56acd5efc208bbd8cb294968c649cd0e78a21535d1405c05e
                                        • Opcode Fuzzy Hash: 722e9875c7dc8f82bae3df37c9a801baf84a4a82c3e8a17b49ba3a82eb61578f
                                        • Instruction Fuzzy Hash: 11C01272158204BECB418B70DC09D2A7BA8EB94212F04C948B0B5D1060CF38C010DB11
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00B3BD4B
                                          • Part of subcall function 00B31F07: CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000), ref: 00B31F87
                                          • Part of subcall function 00B31F07: GetLastError.KERNEL32(?,?,00000000,00000003,-00000001,00000000), ref: 00B31F94
                                          • Part of subcall function 00B31F07: CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00B31FC9
                                          • Part of subcall function 00B31F07: GetLastError.KERNEL32(?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00B31FD1
                                          • Part of subcall function 00B32286: SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00B322BC
                                          • Part of subcall function 00B32286: GetLastError.KERNEL32 ref: 00B322C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLast$Create$H_prologPointer
                                        • String ID:
                                        • API String ID: 3930172495-0
                                        • Opcode ID: 591aca92e6f0c9963b9ff79ae4a40251fb4eccf97383457850ff2414acbf0b9f
                                        • Instruction ID: 529bbe3f3f37fdabf36d9e92f5cbdbc70a63e3116212dada5659739f95af2ce7
                                        • Opcode Fuzzy Hash: 591aca92e6f0c9963b9ff79ae4a40251fb4eccf97383457850ff2414acbf0b9f
                                        • Instruction Fuzzy Hash: 0241B375900965ABDB24DF28CCC1EEB73E8EF44790F2009E9F6469624AEB309E44C690
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___vcrt_EventRegister.LIBVCRUNTIME ref: 00B31029
                                          • Part of subcall function 00B3105D: ___vcrt_EventSetInformation.LIBVCRUNTIME ref: 00B31072
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Event___vcrt_$InformationRegister
                                        • String ID:
                                        • API String ID: 1509250826-0
                                        • Opcode ID: 131f1d3a9344ba49629931691b73cf2561a4fbc2b6f502b7819e1aa933fb083b
                                        • Instruction ID: 1850833d009e7cf35258c066252ac620d93c828a82d2fb8d6b1a37b30eee8ded
                                        • Opcode Fuzzy Hash: 131f1d3a9344ba49629931691b73cf2561a4fbc2b6f502b7819e1aa933fb083b
                                        • Instruction Fuzzy Hash: 9CF0C272600255ABC318CE5DC841EB6B3ECFB45B10F5005AAFD18D7640E735EC60D6E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: c5572526c57f0867fa7f3a4ed41cf9abfed4a9ccaadeba2e4851e86fb458e476
                                        • Instruction ID: 8807375e9f5aa9e675ed1a543afd0a235151ad5f1320105dd1f51c4aca827d0a
                                        • Opcode Fuzzy Hash: c5572526c57f0867fa7f3a4ed41cf9abfed4a9ccaadeba2e4851e86fb458e476
                                        • Instruction Fuzzy Hash: ABF03775E001148FDB18EF5CD40AA6DF7F8EF88610B1049AEE816E3351DAB09D018B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,00B44B84,?,0000015D,?,?,?,?,00B45703,000000FF,00000000,?,?), ref: 00B4849F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 1259ba54b659f8cf1fdee0c00fb32d00ca542e246d902eb1c01560dfea8ccf74
                                        • Instruction ID: 21492a6111ae7ab4eda1f48ca8b10154005a92af3a97592afb8147ae715a85dc
                                        • Opcode Fuzzy Hash: 1259ba54b659f8cf1fdee0c00fb32d00ca542e246d902eb1c01560dfea8ccf74
                                        • Instruction Fuzzy Hash: 05E06D321452226BEA316B7AEC41B5F3AD8DF427B0F1501E1BD15AB290DF20CF00B6E4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00B31C1D), ref: 00B31C9F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ChangeCloseFindNotification
                                        • String ID:
                                        • API String ID: 2591292051-0
                                        • Opcode ID: 9b8e163da2fc098be6e77f345f6fb453003590b8e6e4cb51abf18a8c8582d7a1
                                        • Instruction ID: 8fc042ed1602878c2efe3b02efcf630f54f0793d79ac055653fe5e562471c860
                                        • Opcode Fuzzy Hash: 9b8e163da2fc098be6e77f345f6fb453003590b8e6e4cb51abf18a8c8582d7a1
                                        • Instruction Fuzzy Hash: ABF05E70982B044EDB319B28C958792B7E8DB12731F189F9ED0F6479E0C765688DCB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00B3E740
                                          • Part of subcall function 00B3C21C: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B3C22D
                                          • Part of subcall function 00B3C21C: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B3C23E
                                          • Part of subcall function 00B3C21C: TranslateMessage.USER32(?), ref: 00B3C248
                                          • Part of subcall function 00B3C21C: DispatchMessageW.USER32(?), ref: 00B3C252
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Message$DispatchItemPeekSendTranslate
                                        • String ID:
                                        • API String ID: 4142818094-0
                                        • Opcode ID: 318945c54c88b1d378d2256c1bdc492f3b89dfd276b0740617ec77240608fbd0
                                        • Instruction ID: bd0a9370e29e5bca3b61e49f92aeeab7adee4ed1f5dfca892e9e9b6012028900
                                        • Opcode Fuzzy Hash: 318945c54c88b1d378d2256c1bdc492f3b89dfd276b0740617ec77240608fbd0
                                        • Instruction Fuzzy Hash: D9C012702803006ED7016B50DC07F2A3A56BB94701F6084547341340F18A7148219A15
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EB98
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: b3594db21026ff3af14ec876b6df9f682bad6897f8ab07f3db9cf30952a672e0
                                        • Instruction ID: f083c73bc81980b99eba2b2f08b890d469d57e79ca3cb012a54819bb6e2934fa
                                        • Opcode Fuzzy Hash: b3594db21026ff3af14ec876b6df9f682bad6897f8ab07f3db9cf30952a672e0
                                        • Instruction Fuzzy Hash: 80B01292668202FC32045204BD86F3A21CCC1C0B1273046EBB801D0080A8809C480137
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 595d14309386ad12f2dc1a85ad0498415b026d90097c78560e9c11df9a0eb25b
                                        • Instruction ID: fc0523f4d06629de36c36fe7c7c3d1e5a46073911d942599e4f8ca24a6074a30
                                        • Opcode Fuzzy Hash: 595d14309386ad12f2dc1a85ad0498415b026d90097c78560e9c11df9a0eb25b
                                        • Instruction Fuzzy Hash: 52B012C62D8203FC334453086D46E3621CCC5C4B1273083EFB801D10C0D8804C4C0232
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: a2645f8322886c8e9a7e78e742c833d5cee51f8bf6b7496268e05416352798ec
                                        • Instruction ID: 3b617f3fb5ea343b4d7692eb808cbc9704d0f135cc02ca795c3eb7e881d9a6fb
                                        • Opcode Fuzzy Hash: a2645f8322886c8e9a7e78e742c833d5cee51f8bf6b7496268e05416352798ec
                                        • Instruction Fuzzy Hash: 8BB012D6298202FC334863086D02E3621DCC1C4B2273082EFBC01D1080D8804C080132
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 055efb2126e17c102f0126e8042bf08d5be4c86df4856cc250d052449784f885
                                        • Instruction ID: 7fa2830a2edc051fba6fc8d3c37895b6a97b4eaa526153cb27294734f5975d61
                                        • Opcode Fuzzy Hash: 055efb2126e17c102f0126e8042bf08d5be4c86df4856cc250d052449784f885
                                        • Instruction Fuzzy Hash: 15B012C62D8103FC334453086D06E3621CCC5C4B1273086EFB801D10C0D8804C0C0133
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EEDB
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: e7c6b49a1bfaf0bebd477d98c38763b98d155fafc10868573a72394b36070f76
                                        • Instruction ID: 9c1d4005006fec8cc1fd7c949923a9bbd41048fb1d0e1202c1e521661418fda5
                                        • Opcode Fuzzy Hash: e7c6b49a1bfaf0bebd477d98c38763b98d155fafc10868573a72394b36070f76
                                        • Instruction Fuzzy Hash: DEB01286258112FC325453186E02E3B11CCC0C0B1273091FBB804C10C0DC406C0D0532
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 1a81582dbac068db64df02763478a7b27dec60e558cdb5c85001ecd337560f13
                                        • Instruction ID: 152692624af7da6fb4c2dbd202295bc409c06e28ecb5ff74bc60d0d320bebad3
                                        • Opcode Fuzzy Hash: 1a81582dbac068db64df02763478a7b27dec60e558cdb5c85001ecd337560f13
                                        • Instruction Fuzzy Hash: 3AB012C6298302FC370413547E43D3721CCC1C0B1273082EFB802F009098C04C0A0032
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EEDB
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 9cd6985e75a63b5b37001ff1e5d813600360e9b30def4daae700ded867cc7488
                                        • Instruction ID: 7e4738f7d8bc90a0c7dfc82ff89b68dbec3eaaded0aac9756d1221324a75d760
                                        • Opcode Fuzzy Hash: 9cd6985e75a63b5b37001ff1e5d813600360e9b30def4daae700ded867cc7488
                                        • Instruction Fuzzy Hash: C1B01286258212FC325453086D02E3B11CCC0C0B2273092FBB804C10C0DC406C4C0632
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 34d8ad63f411760f81aae4b0c997a16157909c4f20ffc0e5567641c97c0fc55e
                                        • Instruction ID: 2dc46d4e49a0464397b158e4aa4731cac184bb3c0bd5ffe475630467b3e12264
                                        • Opcode Fuzzy Hash: 34d8ad63f411760f81aae4b0c997a16157909c4f20ffc0e5567641c97c0fc55e
                                        • Instruction Fuzzy Hash: 1AA011CA2A8203FC32082300AE02C3A22CCC0C8B22B308AEEB802E0080A8800C080032
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: b8602684ae1d1e5f2faa3beb1820860d8cedd31f75a177c62361df089c6f8f8d
                                        • Instruction ID: 2dc46d4e49a0464397b158e4aa4731cac184bb3c0bd5ffe475630467b3e12264
                                        • Opcode Fuzzy Hash: b8602684ae1d1e5f2faa3beb1820860d8cedd31f75a177c62361df089c6f8f8d
                                        • Instruction Fuzzy Hash: 1AA011CA2A8203FC32082300AE02C3A22CCC0C8B22B308AEEB802E0080A8800C080032
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: c73cb77aa9887e1b356393ce6f0c992ba4be0265a781b2556cb82c5fb3204e41
                                        • Instruction ID: 2dc46d4e49a0464397b158e4aa4731cac184bb3c0bd5ffe475630467b3e12264
                                        • Opcode Fuzzy Hash: c73cb77aa9887e1b356393ce6f0c992ba4be0265a781b2556cb82c5fb3204e41
                                        • Instruction Fuzzy Hash: 1AA011CA2A8203FC32082300AE02C3A22CCC0C8B22B308AEEB802E0080A8800C080032
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EEDB
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 2abdfb8bb99398e784eb432e0fdfab46b488d82ad63a899d11fcad87c491d69e
                                        • Instruction ID: 906bea1b03040f4b09d1663e88ccb0a1b289b205037b60ec734ec61f0131b77d
                                        • Opcode Fuzzy Hash: 2abdfb8bb99398e784eb432e0fdfab46b488d82ad63a899d11fcad87c491d69e
                                        • Instruction Fuzzy Hash: 86A0019A6A9623FC32686355AE46D3B22DCC4C4B62B309AEAB81695091A8846C491532
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EEDB
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 042eb151d07f9571753923674d31363a4d3a058224968a36d053651f2a531d4c
                                        • Instruction ID: 906bea1b03040f4b09d1663e88ccb0a1b289b205037b60ec734ec61f0131b77d
                                        • Opcode Fuzzy Hash: 042eb151d07f9571753923674d31363a4d3a058224968a36d053651f2a531d4c
                                        • Instruction Fuzzy Hash: 86A0019A6A9623FC32686355AE46D3B22DCC4C4B62B309AEAB81695091A8846C491532
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EE7A
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 49462e803e7ddcda0cc51c8264bfb102a6a5e6e9021fe497846f533d69ff2a6e
                                        • Instruction ID: 2dc46d4e49a0464397b158e4aa4731cac184bb3c0bd5ffe475630467b3e12264
                                        • Opcode Fuzzy Hash: 49462e803e7ddcda0cc51c8264bfb102a6a5e6e9021fe497846f533d69ff2a6e
                                        • Instruction Fuzzy Hash: 1AA011CA2A8203FC32082300AE02C3A22CCC0C8B22B308AEEB802E0080A8800C080032
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00B3EEDB
                                          • Part of subcall function 00B3F1FE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B3F27B
                                          • Part of subcall function 00B3F1FE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B3F28C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: e2a748a5f8fd7a5cbe9d1401ae77c440d278e30df9ac23a5a27ac6faae81a8b7
                                        • Instruction ID: 547108f6e29389bedba8828d2cee9c992d17c8aa6266391f9be682a31110a7b3
                                        • Opcode Fuzzy Hash: e2a748a5f8fd7a5cbe9d1401ae77c440d278e30df9ac23a5a27ac6faae81a8b7
                                        • Instruction Fuzzy Hash: C0A0118A2A8222BC32282300BE02C3B22CCC0C0B22B3082EAB800A0080A8802C080032
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetEndOfFile.KERNELBASE(?,00B36AC7,?,Cyber.exe,?,00000000,?,?,00B365A4,Cyber.exe,?,00000000,00000000,Cyber.exe,Cyber.exe,Cyber.exe), ref: 00B32308
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: File
                                        • String ID:
                                        • API String ID: 749574446-0
                                        • Opcode ID: a993e551648e2ffc2da1a8e561fbe1841dc2c05bd2b7b06665114f4c8511238d
                                        • Instruction ID: 92c3a89089bfd1bb344f40f03507902d048087a47c278627186b287ae4ec6492
                                        • Opcode Fuzzy Hash: a993e551648e2ffc2da1a8e561fbe1841dc2c05bd2b7b06665114f4c8511238d
                                        • Instruction Fuzzy Hash: B6B011320A200A8A8E202B30CC088203A20EA2230B30882A0A002CA0A0CF22C023AA00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetCurrentDirectoryW.KERNELBASE(?,00B3BB4E,00B5226C,00000000,?,00000006,?,00000800), ref: 00B3B9DC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory
                                        • String ID:
                                        • API String ID: 1611563598-0
                                        • Opcode ID: b01d36be9b85a8e714abda1109f45ff01303ceb6adf8ab8be560e03f266bb0da
                                        • Instruction ID: 0a184cfd797156380dd48410d3c5d0aca384db8764794aba957a83310d1a0949
                                        • Opcode Fuzzy Hash: b01d36be9b85a8e714abda1109f45ff01303ceb6adf8ab8be560e03f266bb0da
                                        • Instruction Fuzzy Hash: CDA01270196106468B010B30CC09D15B6505761703B008621B006C20E0CF304414E514
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00B3CDF8
                                        • EndDialog.USER32(?,00000006), ref: 00B3CE0B
                                        • GetDlgItem.USER32(?,0000006C), ref: 00B3CE27
                                        • SetFocus.USER32(00000000), ref: 00B3CE2E
                                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 00B3CE6E
                                        • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00B3CEA1
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00B3CEB7
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B3CED5
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B3CEE5
                                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00B3CF02
                                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00B3CF20
                                          • Part of subcall function 00B340A7: LoadStringW.USER32(?,?,00000200,?), ref: 00B340EC
                                          • Part of subcall function 00B340A7: LoadStringW.USER32(?,?,00000200,?), ref: 00B34102
                                        • _swprintf.LIBCMT ref: 00B3CF50
                                          • Part of subcall function 00B337C1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B337D4
                                        • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00B3CF63
                                        • FindClose.KERNEL32(00000000), ref: 00B3CF66
                                        • _swprintf.LIBCMT ref: 00B3CFC1
                                        • SetDlgItemTextW.USER32(?,00000068,?), ref: 00B3CFD4
                                        • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00B3CFEA
                                        • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00B3D00A
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B3D01A
                                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00B3D034
                                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00B3D04C
                                        • _swprintf.LIBCMT ref: 00B3D07D
                                        • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00B3D090
                                        • _swprintf.LIBCMT ref: 00B3D0E0
                                        • SetDlgItemTextW.USER32(?,00000069,?), ref: 00B3D0F3
                                          • Part of subcall function 00B3BBF0: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00B3BC16
                                          • Part of subcall function 00B3BBF0: GetNumberFormatW.KERNEL32(00000400,00000000,?,00B5B03C,?,?), ref: 00B3BC65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Time$Item$File$FormatText$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumber__vswprintf_c_l
                                        • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                        • API String ID: 3610457056-1840816070
                                        • Opcode ID: 89102f61abbeb37f3e390aa17b6b576f25655e699d2e2691aba84a0ee8367bda
                                        • Instruction ID: c3b80ee296822f040b2cafeb3d77368eb1105763a1f783c2b4e3573d0250cb65
                                        • Opcode Fuzzy Hash: 89102f61abbeb37f3e390aa17b6b576f25655e699d2e2691aba84a0ee8367bda
                                        • Instruction Fuzzy Hash: 2391A372644348BFE231DBA0CC49FFB77ECEB49B01F144869B749D6091DB71A6098762
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __floor_pentium4
                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                        • API String ID: 4168288129-2761157908
                                        • Opcode ID: fd33a07a7a37626a001505f389687399633057bffb51b4a6cfe26c689d353fa9
                                        • Instruction ID: 3df61deb06729c1464d9acaf1b86c000e4602be360f4f964b83471c78c7e05fe
                                        • Opcode Fuzzy Hash: fd33a07a7a37626a001505f389687399633057bffb51b4a6cfe26c689d353fa9
                                        • Instruction Fuzzy Hash: 27C21671E086288FDB25CE289D807EAB7F5EB85305F1541EAD84DE7240E774AF85AF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00B48653
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00B4865D
                                        • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00B4866A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 2741046d8f91a10bf8bc6a8f3de677ba877e6887d850a2dc06713ed1683bb04e
                                        • Instruction ID: a2171ccbea430ea3c632e299918c04031434c5cd2df7f09915c16924ea6f800c
                                        • Opcode Fuzzy Hash: 2741046d8f91a10bf8bc6a8f3de677ba877e6887d850a2dc06713ed1683bb04e
                                        • Instruction Fuzzy Hash: 2F31D37591131C9BCB61DF65D888B9DBBF8AF08310F5042EAE91CA7250EB309F859F54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00B3FD20
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FeaturePresentProcessor
                                        • String ID:
                                        • API String ID: 2325560087-3916222277
                                        • Opcode ID: 61a58c0598c4fc3a6084529c78a711e96a914ba3e28fba4945b6bc7cda1f8f25
                                        • Instruction ID: 059994333ec3714309168cf722c94bbd1b40f6a55631747c5f9fe79a9796f3f1
                                        • Opcode Fuzzy Hash: 61a58c0598c4fc3a6084529c78a711e96a914ba3e28fba4945b6bc7cda1f8f25
                                        • Instruction Fuzzy Hash: A3516EB1D0520A9FEB24CF69D885BAABBF4FB48314F2485BAD415E72A0D7749940CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5826e262e05846006aa707909c2c08ce371c576bfdba0dcab0e4486e13c9c615
                                        • Instruction ID: ab04e8b876af822721875a3b64d107cdb1cd528f8c3b4b4b25d15b5539aa4021
                                        • Opcode Fuzzy Hash: 5826e262e05846006aa707909c2c08ce371c576bfdba0dcab0e4486e13c9c615
                                        • Instruction Fuzzy Hash: F4024B71E012199FDF54CFA9C8806ADBBF1FF88714F2582AAD819E7345D730AA41DB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00B3BC16
                                        • GetNumberFormatW.KERNEL32(00000400,00000000,?,00B5B03C,?,?), ref: 00B3BC65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FormatInfoLocaleNumber
                                        • String ID:
                                        • API String ID: 2169056816-0
                                        • Opcode ID: 09af2b7b7296f9435929f4bc77781dd416e27456e4e4eed43ae1b9ca421ba7cc
                                        • Instruction ID: 2facdffdf328f47e5d7de0ff93e7d00f5e4bf9e5af1f420bf873072511712b40
                                        • Opcode Fuzzy Hash: 09af2b7b7296f9435929f4bc77781dd416e27456e4e4eed43ae1b9ca421ba7cc
                                        • Instruction Fuzzy Hash: DA017136100309EAD720DF64DC05F9B77FCEF09721F5040A2BA15E71A0DB709914CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B512DF,?,?,00000008,?,?,00B50F7F,00000000), ref: 00B51511
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise
                                        • String ID:
                                        • API String ID: 3997070919-0
                                        • Opcode ID: bc18ff07ab515ecf9400cbe1dcbf9feb662c4af815d80ee96309da944f48b698
                                        • Instruction ID: 35b5a1ccc61538f36e4f717b5a51384552be43830d0f5c8a14a5cb57248f5cb2
                                        • Opcode Fuzzy Hash: bc18ff07ab515ecf9400cbe1dcbf9feb662c4af815d80ee96309da944f48b698
                                        • Instruction Fuzzy Hash: 6AB13C356106089FD719CF2CC486B657BE0FF45366F298AD8E89ACF2A1D335D986CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 349741beb0e4e2d5c9e4887cc1253cea8cb6afdc2638d434881ea08fcaf69fe1
                                        • Instruction ID: c7cfd3208fe6990ddeab42ef33276c0d3364d50d0847afc8b17a4fc691a49949
                                        • Opcode Fuzzy Hash: 349741beb0e4e2d5c9e4887cc1253cea8cb6afdc2638d434881ea08fcaf69fe1
                                        • Instruction Fuzzy Hash: CFF1E3B1508715CBC710DF28CC9062AB7E2FB84334F754BAAF9A9572A0DF7199458B83
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: c
                                        • API String ID: 0-112844655
                                        • Opcode ID: 394658f14ab66037e5a3086b609cc48d2f0377a9d0b08a4239e900b1c5802734
                                        • Instruction ID: 1a323f532565a7fa6361cb92f0b726254b0e81cafc36282e2b54600cf79c08db
                                        • Opcode Fuzzy Hash: 394658f14ab66037e5a3086b609cc48d2f0377a9d0b08a4239e900b1c5802734
                                        • Instruction Fuzzy Hash: 75E157B1A483558FC724DF28D480A6EBBE5FFC8708F2049ADE59997350DB31E945CB82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetVersionExW.KERNEL32(?), ref: 00B32BA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Version
                                        • String ID:
                                        • API String ID: 1889659487-0
                                        • Opcode ID: b02f754ad42355bf4bff5650103232a85ed694d437271ba6f5811ebd3033ea83
                                        • Instruction ID: 30f778d3b36ec152419be86dde24d1a5e1b2d42ca65728208320e21124515cd3
                                        • Opcode Fuzzy Hash: b02f754ad42355bf4bff5650103232a85ed694d437271ba6f5811ebd3033ea83
                                        • Instruction Fuzzy Hash: 92F012B590421C8BDB24CF28EC817EAB3A5F758711F2046D5DA1593790EB706980CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00010056,00B3FB64), ref: 00B4004F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 65160f4015a74511ed06474a18fd83712d413b8267947dab5337baa79d3a310b
                                        • Instruction ID: 54a6cbe435ac825c3124c5635302dbf6bf9d26919461b5ed34ee518d260ad8b4
                                        • Opcode Fuzzy Hash: 65160f4015a74511ed06474a18fd83712d413b8267947dab5337baa79d3a310b
                                        • Instruction Fuzzy Hash:
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: HeapProcess
                                        • String ID:
                                        • API String ID: 54951025-0
                                        • Opcode ID: 3654e2b9faac54bdc94ee7c7d48e55cf914b68b7d131278064dfb4b07be328b0
                                        • Instruction ID: 7a76b348abcc375554c9941de6c820f23a3d3f73745fba6e9b500cde9b049f6e
                                        • Opcode Fuzzy Hash: 3654e2b9faac54bdc94ee7c7d48e55cf914b68b7d131278064dfb4b07be328b0
                                        • Instruction Fuzzy Hash: D9A001746436018B97808F35AA8970A3AA9AA56ED274A50A9A609D7170EE248490AB05
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                        • Instruction ID: 95b828cba6b4d2de7997806198af9def539f131674c820794c213845fa05e49a
                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                        • Instruction Fuzzy Hash: C8C150326055930ADF2D463E847413FBAE1DAA17B131A17EDE4B2CB1D4FE20C669F620
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                        • Instruction ID: 2e1d2b9f7b2bd8634c2d6d47226eca310738d4cd53b3bb7440644613caebb058
                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                        • Instruction Fuzzy Hash: E8C1533220559309DF2D473D947413EBAE1DAA27B131A17DDE4B2CB1D5FE20CA69F620
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                        • Instruction ID: 27dde6cf844e748ce4dd846b8c573b09fae3923f9cd1a5ed7be4c5aaf027a40c
                                        • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                        • Instruction Fuzzy Hash: 6CC18336A0559309DF2D463D947413FBAE1DAA27B131A1BEDD4B3CB0C5FE10C6A9A620
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                        • Instruction ID: c0060dd2a460725461177018f54025a7fa0d606a05d9b7adfa8436d50f64e6c6
                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                        • Instruction Fuzzy Hash: FCC1513260559309DF2D463E947413FBBE1DAA17B131A1BEDD4B2CB1D4FE20C6A9E620
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 95e60f1eb8535692d3b522a7c3775175520a61252bb7d57cc916f9c7306491ca
                                        • Instruction ID: f00ab883edfe3517b6b73c58b4881b9aa8e28ab20e185ed1fdef20c51636ddbc
                                        • Opcode Fuzzy Hash: 95e60f1eb8535692d3b522a7c3775175520a61252bb7d57cc916f9c7306491ca
                                        • Instruction Fuzzy Hash: D0616671600F0867DA389E6848967BE23E5EB41741F2008DAE983CF387D655DF81B359
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 618e8da4ab10fc13031c9bfdaf2826663ed666212431e0f9b8e60bf2cf0d1d74
                                        • Instruction ID: 8c7a226005e1c5c06bf43eca0fe58e4eddffa6fd637649d3689ebb2aba94942e
                                        • Opcode Fuzzy Hash: 618e8da4ab10fc13031c9bfdaf2826663ed666212431e0f9b8e60bf2cf0d1d74
                                        • Instruction Fuzzy Hash: 0721DD71A202658FDB18CF2DDCD093A7BA5E74630275681ABED4687381C935ED15C7E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsInExceptionSpec.LIBVCRUNTIME ref: 00B4396F
                                        • _GetRangeOfTrysToCheck.LIBVCRUNTIME ref: 00B439EA
                                        • ___TypeMatch.LIBVCRUNTIME ref: 00B43A5E
                                        • ___DestructExceptionObject.LIBVCRUNTIME ref: 00B43AE3
                                        • IsInExceptionSpec.LIBVCRUNTIME ref: 00B43B1E
                                        • FindHandlerForForeignException.LIBVCRUNTIME ref: 00B43B6D
                                        • ___DestructExceptionObject.LIBVCRUNTIME ref: 00B43B8F
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00B43BA7
                                        • _UnwindNestedFrames.LIBCMT ref: 00B43BAF
                                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 00B43BBB
                                        • CallUnexpected.LIBVCRUNTIME ref: 00B43BC6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Exception$DestructObjectSpecUnwind$CallCheckException@8FindForeignFrameFramesHandlerMatchNestedRangeStateThrowTrysTypeUnexpected
                                        • String ID: csm$csm$csm
                                        • API String ID: 410073093-393685449
                                        • Opcode ID: bb981c6c4968072ab66617368b887bb150a275832e0a1b8ef02efedf7efa7604
                                        • Instruction ID: 86f744f61240055f2c1f79412e5f103f52e13aa8a62f03d71ab830626f2ad044
                                        • Opcode Fuzzy Hash: bb981c6c4968072ab66617368b887bb150a275832e0a1b8ef02efedf7efa7604
                                        • Instruction Fuzzy Hash: F6B19B30800209AFDF28DF94C885BAEBBF4FF18B14F188199E85167251C7759B45EFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ___free_lconv_mon.LIBCMT ref: 00B4BFDD
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BB95
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BBA7
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BBB9
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BBCB
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BBDD
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BBEF
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC01
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC13
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC25
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC37
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC49
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC5B
                                          • Part of subcall function 00B4BB78: _free.LIBCMT ref: 00B4BC6D
                                        • _free.LIBCMT ref: 00B4BFD2
                                          • Part of subcall function 00B48433: RtlFreeHeap.NTDLL(00000000,00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000), ref: 00B48449
                                          • Part of subcall function 00B48433: GetLastError.KERNEL32(00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000,00000000), ref: 00B4845B
                                        • _free.LIBCMT ref: 00B4BFF4
                                        • _free.LIBCMT ref: 00B4C009
                                        • _free.LIBCMT ref: 00B4C014
                                        • _free.LIBCMT ref: 00B4C036
                                        • _free.LIBCMT ref: 00B4C049
                                        • _free.LIBCMT ref: 00B4C057
                                        • _free.LIBCMT ref: 00B4C062
                                        • _free.LIBCMT ref: 00B4C09A
                                        • _free.LIBCMT ref: 00B4C0A1
                                        • _free.LIBCMT ref: 00B4C0BE
                                        • _free.LIBCMT ref: 00B4C0D6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                        • String ID:
                                        • API String ID: 161543041-0
                                        • Opcode ID: f2badd6d70e525db6745fdd30c7a086bfa1488ab33c332ad2ed4e2b290c5aaca
                                        • Instruction ID: d9bfd935b4380a9661bc8278d87936c7bda2530d2865e438ae10a6e744f47cf3
                                        • Opcode Fuzzy Hash: f2badd6d70e525db6745fdd30c7a086bfa1488ab33c332ad2ed4e2b290c5aaca
                                        • Instruction Fuzzy Hash: 5A315071601705DFEB70AB39E845B6ABBE8EF00750F5484AAE459D7251DF31EF40AB20
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 00B48C46
                                          • Part of subcall function 00B48433: RtlFreeHeap.NTDLL(00000000,00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000), ref: 00B48449
                                          • Part of subcall function 00B48433: GetLastError.KERNEL32(00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000,00000000), ref: 00B4845B
                                        • _free.LIBCMT ref: 00B48C52
                                        • _free.LIBCMT ref: 00B48C5D
                                        • _free.LIBCMT ref: 00B48C68
                                        • _free.LIBCMT ref: 00B48C73
                                        • _free.LIBCMT ref: 00B48C7E
                                        • _free.LIBCMT ref: 00B48C89
                                        • _free.LIBCMT ref: 00B48C94
                                        • _free.LIBCMT ref: 00B48C9F
                                        • _free.LIBCMT ref: 00B48CAD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 6e52601b2b9a6bc4f867ab9784aef64cf098ede6d797b437babc495aac8c2f2d
                                        • Instruction ID: fb050ccb31b28458515e0910ba6a3bead1a00c36e9c0ed020324d318bdf6a2d9
                                        • Opcode Fuzzy Hash: 6e52601b2b9a6bc4f867ab9784aef64cf098ede6d797b437babc495aac8c2f2d
                                        • Instruction Fuzzy Hash: 77117476A14109AFCB05EF58E942DDD3BB5EF04390B9141E5BA088B222DA71EB51AB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _wcslen.LIBCMT ref: 00B3AA8C
                                        • _wcslen.LIBCMT ref: 00B3AB2D
                                        • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00B3B2A0,?), ref: 00B3AB3C
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00B3AB5D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                        • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                        • API String ID: 1116704506-4209811716
                                        • Opcode ID: 1f9941fc11555e789562cad4225a23da501c6f5ebae61f78b9aa423bfa500995
                                        • Instruction ID: 292a068c38866cf58b4e17c434db814428cda171cf2d879e9788b7c477f237d7
                                        • Opcode Fuzzy Hash: 1f9941fc11555e789562cad4225a23da501c6f5ebae61f78b9aa423bfa500995
                                        • Instruction Fuzzy Hash: 953112321097017FE725AB209C06F6BB7E9DF52321F3041DAF490A61D2EF749A0993A2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindow.USER32(?,00000005), ref: 00B3E0FD
                                        • GetClassNameW.USER32(00000000,?,00000800), ref: 00B3E12C
                                          • Part of subcall function 00B35644: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B32EC7,?,?,?,00B32E74,?,-00000002,?,00000000,?), ref: 00B3565A
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00B3E14A
                                        • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00B3E161
                                          • Part of subcall function 00B3B5FB: GetDC.USER32(00000000), ref: 00B3B607
                                          • Part of subcall function 00B3B5FB: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B3B616
                                          • Part of subcall function 00B3B5FB: ReleaseDC.USER32(00000000,00000000), ref: 00B3B624
                                          • Part of subcall function 00B3B5B8: GetDC.USER32(00000000), ref: 00B3B5C4
                                          • Part of subcall function 00B3B5B8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00B3B5D3
                                          • Part of subcall function 00B3B5B8: ReleaseDC.USER32(00000000,00000000), ref: 00B3B5E1
                                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00B3E19B
                                        • DeleteObject.GDI32(00000000), ref: 00B3E1AA
                                        • GetWindow.USER32(00000000,00000002), ref: 00B3E1B3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Window$CapsDeviceMessageReleaseSend$ClassCompareDeleteLongNameObjectString
                                        • String ID: STATIC
                                        • API String ID: 2770908980-1882779555
                                        • Opcode ID: 7f2deba61fab1d1556cd19706ef5af2da2a72601e4ff99571001802e5a74f385
                                        • Instruction ID: 53b4e98e4e9d2c68314878896f4124d3916f6ff563e7945e67e70494dde0481a
                                        • Opcode Fuzzy Hash: 7f2deba61fab1d1556cd19706ef5af2da2a72601e4ff99571001802e5a74f385
                                        • Instruction Fuzzy Hash: 9221D172541B15BBDB226B548C46FBE77ACEF00B52F200091FA10B71D1CF349E4186A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTempPathW.KERNEL32(00000800,?), ref: 00B3D8FA
                                          • Part of subcall function 00B32FFE: _wcslen.LIBCMT ref: 00B33004
                                        • _swprintf.LIBCMT ref: 00B3D92C
                                          • Part of subcall function 00B337C1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B337D4
                                        • _swprintf.LIBCMT ref: 00B3D959
                                        • GetFileAttributesW.KERNEL32(?), ref: 00B3D968
                                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 00B3D97B
                                        • EndDialog.USER32(?,00000001), ref: 00B3DA81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _swprintf$AttributesDialogFileItemPathTempText__vswprintf_c_l_wcslen
                                        • String ID: %s%s%d
                                        • API String ID: 2779928984-1000756122
                                        • Opcode ID: 2986a0a07eca066a5c56a675835d5a32876486b4f0592d1ba9a1a320c2b875a6
                                        • Instruction ID: 69ac20928500d822221d18ad52fa338b5a48b9b72a46b0f639e911d8888991eb
                                        • Opcode Fuzzy Hash: 2986a0a07eca066a5c56a675835d5a32876486b4f0592d1ba9a1a320c2b875a6
                                        • Instruction Fuzzy Hash: 7A511AB2804259AEEF25DB60DD84EEA77FCEB04300F5041E6E618E7051EF709B888F50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00B3C2CD
                                        • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00B3C2E2
                                        • GetDlgItem.USER32(?,00000065), ref: 00B3C2F1
                                        • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00B3C305
                                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00B3C317
                                        • EndDialog.USER32(?,00000001), ref: 00B3C361
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: MessageSend$Item$Dialog
                                        • String ID: LICENSEDLG
                                        • API String ID: 781181374-2177901306
                                        • Opcode ID: 83a19f67ee4ad8427ff2bea0cdd9c7ab2f6af5630988c0df049608713941164d
                                        • Instruction ID: 4e56da26c5568fd24c1cf6f9d14faf0839000f4abc04f301bd744691a57feaf9
                                        • Opcode Fuzzy Hash: 83a19f67ee4ad8427ff2bea0cdd9c7ab2f6af5630988c0df049608713941164d
                                        • Instruction Fuzzy Hash: A021AF322412497FD6216BA5EC49F6B3FEDEB8AB42F114484F241B70A1CF7299119B78
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00B3A931
                                        • GetTickCount.KERNEL32 ref: 00B3A94F
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B3A965
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B3A979
                                        • TranslateMessage.USER32(?), ref: 00B3A984
                                        • DispatchMessageW.USER32(?), ref: 00B3A98F
                                        • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00B3AA3F
                                        • SetWindowTextW.USER32(?,00000000), ref: 00B3AA49
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                                        • String ID:
                                        • API String ID: 4150546248-0
                                        • Opcode ID: 05f0278565dd2335bcb527c31a0380878b5aa86fe6561ba982279acfb0809d4b
                                        • Instruction ID: 6d0758b412be387be04aafe1c18f6422a53f72cebd2a29ce03c66d541fda7c3d
                                        • Opcode Fuzzy Hash: 05f0278565dd2335bcb527c31a0380878b5aa86fe6561ba982279acfb0809d4b
                                        • Instruction Fuzzy Hash: B3416B72504306AFC710DF65D884E2BBBE8FF48711F254AA9FA85D7250DB20EC44CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: </p>$</style>$<br>$<style>$>
                                        • API String ID: 176396367-3568243669
                                        • Opcode ID: 23455ebe8d2c42ee6d361ee4cac9fd911e3cd1f39cff3c51fecde6cf2a5d5258
                                        • Instruction ID: 3735420b4ff08b28ab5860c90feaa065e6e9ac3c50a3b198b67a32318c8181c5
                                        • Opcode Fuzzy Hash: 23455ebe8d2c42ee6d361ee4cac9fd911e3cd1f39cff3c51fecde6cf2a5d5258
                                        • Instruction Fuzzy Hash: 1041596660430281CB38AF248892F7BB3F0EF61750F78449EEED197185F7A58D89C392
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00B4F6F2,00000000,00000000,00000000,00000000,00000000,00B45428), ref: 00B4EFBF
                                        • __fassign.LIBCMT ref: 00B4F03A
                                        • __fassign.LIBCMT ref: 00B4F055
                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00B4F07B
                                        • WriteFile.KERNEL32(?,00000000,00000000,00B4F6F2,00000000,?,?,?,?,?,?,?,?,?,00B4F6F2,00000000), ref: 00B4F09A
                                        • WriteFile.KERNEL32(?,00000000,00000001,00B4F6F2,00000000,?,?,?,?,?,?,?,?,?,00B4F6F2,00000000), ref: 00B4F0D3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                        • String ID:
                                        • API String ID: 1324828854-0
                                        • Opcode ID: f40ee0bcf6d2d12857701f37df3a3aa393c86c2eea89d26542b020cb27c71583
                                        • Instruction ID: 24e54b84a2405a8e6fb5f61d888cb7221b59777eacb3b714a9f9a964dc77d2f4
                                        • Opcode Fuzzy Hash: f40ee0bcf6d2d12857701f37df3a3aa393c86c2eea89d26542b020cb27c71583
                                        • Instruction Fuzzy Hash: 1551A5719002499FDB10CFA8DC85AFEBBF9EF49300F1445AAE955F7291DB309A40DB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ShowWindow.USER32(?,00000000), ref: 00B3B150
                                        • GetWindowRect.USER32(?,?), ref: 00B3B175
                                        • ShowWindow.USER32(?,00000005,?), ref: 00B3B20C
                                        • SetWindowTextW.USER32(?,00000000), ref: 00B3B214
                                        • ShowWindow.USER32(00000000,00000005), ref: 00B3B22A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Window$Show$RectText
                                        • String ID: RarHtmlClassName
                                        • API String ID: 3937224194-1658105358
                                        • Opcode ID: 75269605f460bc65c3187418c037fd30fd2f061b39f8403001d41552aa24998c
                                        • Instruction ID: 26339a840ea72591e40399334a70f01850724815ec3ef5474eba6f1043130b76
                                        • Opcode Fuzzy Hash: 75269605f460bc65c3187418c037fd30fd2f061b39f8403001d41552aa24998c
                                        • Instruction Fuzzy Hash: 15317C32101314AFDB119F649D89F2BBFE8EF49712F104599FA49AA156CB30E900CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B4BCDF: _free.LIBCMT ref: 00B4BD08
                                        • _free.LIBCMT ref: 00B4BD69
                                          • Part of subcall function 00B48433: RtlFreeHeap.NTDLL(00000000,00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000), ref: 00B48449
                                          • Part of subcall function 00B48433: GetLastError.KERNEL32(00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000,00000000), ref: 00B4845B
                                        • _free.LIBCMT ref: 00B4BD74
                                        • _free.LIBCMT ref: 00B4BD7F
                                        • _free.LIBCMT ref: 00B4BDD3
                                        • _free.LIBCMT ref: 00B4BDDE
                                        • _free.LIBCMT ref: 00B4BDE9
                                        • _free.LIBCMT ref: 00B4BDF4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 31c8cb2a68751e9ba9d5abfbd719d282f1c7ec6da7f78de6818c66f52ba2065d
                                        • Instruction ID: ba43fa071d7110157ae17cd9eef7ad01c0cee49fda27bb410d54440c93c4d681
                                        • Opcode Fuzzy Hash: 31c8cb2a68751e9ba9d5abfbd719d282f1c7ec6da7f78de6818c66f52ba2065d
                                        • Instruction Fuzzy Hash: AD111C71A40B04AAD620BBB4DC87FCB77DDAF04740F808895B399A6153EF65FB44A650
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,00B4337A,00B406C8), ref: 00B43391
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B4339F
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B433B8
                                        • SetLastError.KERNEL32(00000000,?,00B4337A,00B406C8), ref: 00B4340A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: ba2b0227745349dc8393b39462f5947c19ad5037edb46172f6c7429fd1498910
                                        • Instruction ID: 9ef6e30b865492a008b5036a255b50a2732e1ce920dfe7b7bacc8f21d6efff5e
                                        • Opcode Fuzzy Hash: ba2b0227745349dc8393b39462f5947c19ad5037edb46172f6c7429fd1498910
                                        • Instruction Fuzzy Hash: 56014C322197191FEF261B74BC9AB6A2AD4EB21B7632802EAF120521F0FF114F007144
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                        • API String ID: 0-1718035505
                                        • Opcode ID: c9186a7e9d9ebe3beeba53701efa01065263b996953c687763d3293bc85c2434
                                        • Instruction ID: a31104403879a7ccebc4c4feb5c7adc3c77f0e0d7c912007c5ee02a79e998782
                                        • Opcode Fuzzy Hash: c9186a7e9d9ebe3beeba53701efa01065263b996953c687763d3293bc85c2434
                                        • Instruction Fuzzy Hash: 7001D6726963226B6F201F646C8069632C4DA2275673401FBE421C32D0EF90C946D790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID:
                                        • API String ID: 2931989736-0
                                        • Opcode ID: 2ac5ff07dddfe22c008f0087ea436ea87b752b1d120e6db34095e1bd90d91fe1
                                        • Instruction ID: c2c6805173c24b42f8e8d62b3f31e410a04977f4b47211290cb7dbf2b92b7489
                                        • Opcode Fuzzy Hash: 2ac5ff07dddfe22c008f0087ea436ea87b752b1d120e6db34095e1bd90d91fe1
                                        • Instruction Fuzzy Hash: CA217F71640219BBD714AE15D881F7B37E8DE20B85F3484ECFC8ADB241E372DE45A662
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,00B44E4E,?,00000000,?,00B449ED,00000200,00000000,?), ref: 00B48D2A
                                        • _free.LIBCMT ref: 00B48D5D
                                        • _free.LIBCMT ref: 00B48D85
                                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00B48D92
                                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00B48D9E
                                        • _abort.LIBCMT ref: 00B48DA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_free$_abort
                                        • String ID:
                                        • API String ID: 3160817290-0
                                        • Opcode ID: 7310c25e4492324f0dd20db90f1013f798c53e17fa95b4c39b96100a743ddf20
                                        • Instruction ID: 0b2fc34ed7e849cd0b4ecc975a57b0a6ad40caa6a308d9f50a0772bc8cbfdfa8
                                        • Opcode Fuzzy Hash: 7310c25e4492324f0dd20db90f1013f798c53e17fa95b4c39b96100a743ddf20
                                        • Instruction Fuzzy Hash: ACF0A93658270126D61637386C05F2E25F5DFE27A2B3401F8F618E72E1FF208B01B155
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe, xrefs: 00B39382
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _strncpy$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                        • API String ID: 2527496121-3224907921
                                        • Opcode ID: 5d30315b76e8b9b6d2919bfbc9841002a4eec9e9f0997652db0a0291b2a2d411
                                        • Instruction ID: cbeaf9f94abb469d303635877a41bc2c59f35d95520c1ad608bd97f109919b50
                                        • Opcode Fuzzy Hash: 5d30315b76e8b9b6d2919bfbc9841002a4eec9e9f0997652db0a0291b2a2d411
                                        • Instruction Fuzzy Hash: 55A17BB1929319DBC711EF68EC81B267BE5FB88324F20456BF44DD3361DBB098848B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: UNC$\\?\
                                        • API String ID: 176396367-253988292
                                        • Opcode ID: 8c8361db4b76c66f61170509aecb41e1ab7355486d36b525c5fead84adad100e
                                        • Instruction ID: be23324841d6738310ef6090505b23fb8124ed5a475c3ebc65ee2e829af65214
                                        • Opcode Fuzzy Hash: 8c8361db4b76c66f61170509aecb41e1ab7355486d36b525c5fead84adad100e
                                        • Instruction Fuzzy Hash: 2441E576900305B6CB30AB60CC46FEB73ECAF16B11F6144E6F91597142E774EB4597A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _strlen$_swprintf_wcsrchr
                                        • String ID: %08x
                                        • API String ID: 2422602752-3682738293
                                        • Opcode ID: c255b1017cdfcaf434325e1d6d5d39a8b72905afb32fb368e6b365528075b8eb
                                        • Instruction ID: da6b93dd6dc29820834f9cc73341fc6f0b04fca68eb2fb71eebad44171797807
                                        • Opcode Fuzzy Hash: c255b1017cdfcaf434325e1d6d5d39a8b72905afb32fb368e6b365528075b8eb
                                        • Instruction Fuzzy Hash: 81410773908341AAD734A6248C49FBB73DCEB85B10F2406E9F985D7182EA75AE4482A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe,00000104), ref: 00B475B5
                                        • _free.LIBCMT ref: 00B47680
                                        • _free.LIBCMT ref: 00B4768A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$FileModuleName
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe$H&|
                                        • API String ID: 2506810119-1201444900
                                        • Opcode ID: aa4f7b7ff419dd15da764227ffd68b942ada7912c5cb0a909385f36e90146995
                                        • Instruction ID: 8d4089edd69530b0a53f02fbe9402654c1926482c1021a39bf3e447e89a57b6b
                                        • Opcode Fuzzy Hash: aa4f7b7ff419dd15da764227ffd68b942ada7912c5cb0a909385f36e90146995
                                        • Instruction Fuzzy Hash: 5E3184B1A44618AFDB21DF99D881D9EBBFDEB85750F5140E6F40497211EF704B40EB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 00B42FDB
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00B43055
                                          • Part of subcall function 00B51950: __FindPESection.LIBCMT ref: 00B519A9
                                        • _ValidateLocalCookies.LIBCMT ref: 00B430C9
                                        • _ValidateLocalCookies.LIBCMT ref: 00B430F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentFindImageNonwritableSection
                                        • String ID: csm
                                        • API String ID: 1685366865-1018135373
                                        • Opcode ID: 1e5473e8cd4e1cee79f4333f3d0e04186c23a15ff031bfd0eb14aa5492f15338
                                        • Instruction ID: 1f1e48f79b34e38ab91d677fee080561a9f73285e80883330394e50c7a3b1992
                                        • Opcode Fuzzy Hash: 1e5473e8cd4e1cee79f4333f3d0e04186c23a15ff031bfd0eb14aa5492f15338
                                        • Instruction Fuzzy Hash: 8E41B334A00208ABCF10DF68C884BAEBBF5EF45724F1882D5E8149B392C7319F55DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: &nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                        • API String ID: 176396367-864536935
                                        • Opcode ID: da533fddff33c89c87c530f98187ef6528700bf47f86e8c4e070eeff7107a565
                                        • Instruction ID: 3768dd02f5f6ef7340f475d8095d9acb259ea927b3cb327823917d77c054c760
                                        • Opcode Fuzzy Hash: da533fddff33c89c87c530f98187ef6528700bf47f86e8c4e070eeff7107a565
                                        • Instruction Fuzzy Hash: 783129326443016AD634BB24AC42B7B73E4EB50721F7084AFF4D5575D0FBA0AA9583A6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EndDialog.USER32(?,00000001), ref: 00B3E095
                                        • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 00B3E0AB
                                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 00B3E0C5
                                        • SetDlgItemTextW.USER32(?,00000066), ref: 00B3E0D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ItemText$Dialog
                                        • String ID: RENAMEDLG
                                        • API String ID: 1770891597-3299779563
                                        • Opcode ID: 992e0acf29160ebbff6ea7da1559a60a44247f880ce1714c278132518bb60458
                                        • Instruction ID: f28545557160b96c0a62a0147cf5714a1260015b7d89e6fd9298c143b800ccf8
                                        • Opcode Fuzzy Hash: 992e0acf29160ebbff6ea7da1559a60a44247f880ce1714c278132518bb60458
                                        • Instruction Fuzzy Hash: FF01F132A44314B6D2294E646D8AF377BECE749B41F20049BF310B70E0CAE2EC049762
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00B4746F,?,?,00B4740F,?,00B598A8,0000000C,00B47522,?,00000002), ref: 00B4749A
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B474AD
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,00B4746F,?,?,00B4740F,?,00B598A8,0000000C,00B47522,?,00000002,00000000), ref: 00B474D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: e2fe5ff57c00961d5edfe6dcaecbe56a967ec65a6920bbdcf77f3a0cc7fd6c0a
                                        • Instruction ID: e5d64675544b3a7f78a111f69ce2e99d835e59858ce036d407c68a0bb10b5726
                                        • Opcode Fuzzy Hash: e2fe5ff57c00961d5edfe6dcaecbe56a967ec65a6920bbdcf77f3a0cc7fd6c0a
                                        • Instruction Fuzzy Hash: 5BF06931A41308BBDB119BA0DC09BAEBEA8EB05752F1441E4AD05A22A0CF705A85DA90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B347AA: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B347C5
                                          • Part of subcall function 00B347AA: LoadLibraryW.KERNELBASE(?,?,00B341B6,Crypt32.dll,?,00B34239,?,00B3421C,?,?,?,?), ref: 00B347E7
                                        • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B341C2
                                        • GetProcAddress.KERNEL32(00B5FA8C,CryptUnprotectMemory), ref: 00B341D2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressProc$DirectoryLibraryLoadSystem
                                        • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                        • API String ID: 2141747552-1753850145
                                        • Opcode ID: 0cf5af9afdcb172858da93b7a181a6a3dee1c8e56775f736b888cab4fa6023df
                                        • Instruction ID: 2d68228d9aeea0eef19de3c70d913d8e43dda54e57412bfb377ccbebd638cec7
                                        • Opcode Fuzzy Hash: 0cf5af9afdcb172858da93b7a181a6a3dee1c8e56775f736b888cab4fa6023df
                                        • Instruction Fuzzy Hash: AEE086B0902B43AECB015B35A808715FFD5FF57701F1886D5E414936A0DBB8E4A9CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free
                                        • String ID:
                                        • API String ID: 269201875-0
                                        • Opcode ID: f1e3ea5446ed0a578cf80034effb80992bc215982bda2a15e3b33bb875ee09fe
                                        • Instruction ID: 7cb0dd1b24859f40fe7ccea52ecbe1de23084b907e9d634f53dbe3d8543925bd
                                        • Opcode Fuzzy Hash: f1e3ea5446ed0a578cf80034effb80992bc215982bda2a15e3b33bb875ee09fe
                                        • Instruction Fuzzy Hash: 6641AF72E50204AFCB24DF78C881A6AB7F5EF88314B1585E9E515EB391DB71AE01DB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32 ref: 00B4B3C4
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B4B3E7
                                          • Part of subcall function 00B4846D: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B44B84,?,0000015D,?,?,?,?,00B45703,000000FF,00000000,?,?), ref: 00B4849F
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B4B40D
                                        • _free.LIBCMT ref: 00B4B420
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B4B42F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                        • String ID:
                                        • API String ID: 336800556-0
                                        • Opcode ID: 00135f355f07a6bc3231540024faf66860bf1e3fbef26895d9a70a30b17f4c3e
                                        • Instruction ID: 754323b3000592e2a98d8ecb549673845fd3766cc9797e87012b6fdef4b69729
                                        • Opcode Fuzzy Hash: 00135f355f07a6bc3231540024faf66860bf1e3fbef26895d9a70a30b17f4c3e
                                        • Instruction Fuzzy Hash: 7B019E626026117F63211B6A6C8DD7F7AADDAC6BA131441A9BB04D3241EF60CE02A1B1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,00000000,?,00B4884B,00B48550,?,00B48D54,00000001,00000364,?,00B449ED,00000200,00000000,?), ref: 00B48DAF
                                        • _free.LIBCMT ref: 00B48DE4
                                        • _free.LIBCMT ref: 00B48E0B
                                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00B48E18
                                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00B48E21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_free
                                        • String ID:
                                        • API String ID: 3170660625-0
                                        • Opcode ID: ada51a3fad25b88def2f673ee149abc0cbcb295b7c5134223030529dfaeab032
                                        • Instruction ID: d4d6a81cb55c9033ffaa8c251c1f92c2e05077bb6b3348fac535b78796c4844d
                                        • Opcode Fuzzy Hash: ada51a3fad25b88def2f673ee149abc0cbcb295b7c5134223030529dfaeab032
                                        • Instruction Fuzzy Hash: 8A01F932682B012B921737386C85E3F25EEDBD67A273400E8F514A72D2EF208F01B155
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 00B4BC8E
                                          • Part of subcall function 00B48433: RtlFreeHeap.NTDLL(00000000,00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000), ref: 00B48449
                                          • Part of subcall function 00B48433: GetLastError.KERNEL32(00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000,00000000), ref: 00B4845B
                                        • _free.LIBCMT ref: 00B4BCA0
                                        • _free.LIBCMT ref: 00B4BCB2
                                        • _free.LIBCMT ref: 00B4BCC4
                                        • _free.LIBCMT ref: 00B4BCD6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 1514a6796a3bd04bd45510e7a0f34acda7a579cc491aa71b66910b8bd64461c3
                                        • Instruction ID: cf750a20fad14d4259c86605cbd1aa8591d9122cf62a2ece88d12458d2c2b754
                                        • Opcode Fuzzy Hash: 1514a6796a3bd04bd45510e7a0f34acda7a579cc491aa71b66910b8bd64461c3
                                        • Instruction Fuzzy Hash: A5F03032605304AF8620EB5CF9C6D1E77FDEA44791BA448C5F118D7A02CF30FE80AAA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _wcslen.LIBCMT ref: 00B3566E
                                        • _wcslen.LIBCMT ref: 00B3567F
                                        • _wcslen.LIBCMT ref: 00B3568F
                                        • _wcslen.LIBCMT ref: 00B3569D
                                        • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,?,00000000,?,00B32D53,__rar_,00000000,00000006,?,?,00000000), ref: 00B356B8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen$CompareString
                                        • String ID:
                                        • API String ID: 3397213944-0
                                        • Opcode ID: f097314d2bf4ae80ff8995bf88f94e6a6656161cabbc13f5efc95d072e39d52a
                                        • Instruction ID: 2b55dba9f7409c98bdecbb775b9732d66b896420c1e3d07e72dd8007d26430e8
                                        • Opcode Fuzzy Hash: f097314d2bf4ae80ff8995bf88f94e6a6656161cabbc13f5efc95d072e39d52a
                                        • Instruction Fuzzy Hash: D6F06D32004014BFCF621F51DC09DCE3F65EB41770B618045F9595A060CB329661A784
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 00B47F17
                                          • Part of subcall function 00B48433: RtlFreeHeap.NTDLL(00000000,00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000), ref: 00B48449
                                          • Part of subcall function 00B48433: GetLastError.KERNEL32(00000000,?,00B4BD0D,00000000,00000000,00000000,00000000,?,00B4BD34,00000000,00000007,00000000,?,00B4C131,00000000,00000000), ref: 00B4845B
                                        • _free.LIBCMT ref: 00B47F29
                                        • _free.LIBCMT ref: 00B47F3C
                                        • _free.LIBCMT ref: 00B47F4D
                                        • _free.LIBCMT ref: 00B47F5E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 589a7f0d750813a151de47585319332f10672784c69a289b739332c818a77603
                                        • Instruction ID: 2303621b2493b9a929559365adb50b1dbbdb4c9df1bf7ab07d6af865e9634667
                                        • Opcode Fuzzy Hash: 589a7f0d750813a151de47585319332f10672784c69a289b739332c818a77603
                                        • Instruction Fuzzy Hash: 48F0B2B19582269B86416B28FC429083BE5FB19B6239501CAF4149B371CF714E41EFC9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharUpperW.USER32(?,?,?,?,00001000), ref: 00B3D15C
                                        • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00B3D183
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CharUpper
                                        • String ID: -
                                        • API String ID: 9403516-2547889144
                                        • Opcode ID: fd41cf280816c63aa1ab7cd86f5f20a7f35da61aa45caa8b2c0fe10493e43293
                                        • Instruction ID: f5c1811761b80925f5cdf91d04f2868ccda1ab29755cb3098f55d86f6978e5be
                                        • Opcode Fuzzy Hash: fd41cf280816c63aa1ab7cd86f5f20a7f35da61aa45caa8b2c0fe10493e43293
                                        • Instruction Fuzzy Hash: 7021E27244820666D320AF68EC4DB7B76D8F789700FA148A9F4A5A2195DB78CC88C322
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EndDialog.USER32(?,00000001), ref: 00B3BF92
                                        • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00B3BFAA
                                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 00B3BFD8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ItemText$Dialog
                                        • String ID: GETPASSWORD1
                                        • API String ID: 1770891597-3292211884
                                        • Opcode ID: a7a03e828dea2f31120692051c6c35b06f5bb48af64481037e267b03da33b769
                                        • Instruction ID: 4c094e86eeba1bdc07b489ee35e3ae2e46ff2b4e19cd5757b7609c7dd129772a
                                        • Opcode Fuzzy Hash: a7a03e828dea2f31120692051c6c35b06f5bb48af64481037e267b03da33b769
                                        • Instruction Fuzzy Hash: 2411C8329042187ADB215A649C89FFB77ECEB09711F2000E5FB45F3088C7A5AE559BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: RENAMEDLG$REPLACEFILEDLG
                                        • API String ID: 0-56093855
                                        • Opcode ID: 4f4ab97b95b46df46c87c8a785396235181f5a4d16a16862c30d42accede9e6e
                                        • Instruction ID: 984f0dfc9971d6c8156223fc4aaeb1fafe7ba5b0594659c3f4e9281c21cd794c
                                        • Opcode Fuzzy Hash: 4f4ab97b95b46df46c87c8a785396235181f5a4d16a16862c30d42accede9e6e
                                        • Instruction Fuzzy Hash: CA01BC32240305AFC3519B28EC84F13BBE8E759B91F2408A7F855E36B0DA71DC46EB20
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00B33DAB
                                        • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00B33DBA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: FindHandleModuleResource
                                        • String ID: LTR$RTL
                                        • API String ID: 3537982541-719208805
                                        • Opcode ID: 404374f2eb5c2e5540a7bdc06187d04f922396aa0ddea1259ae7fe0d23b77fc4
                                        • Instruction ID: 07c2e805b9ea7a70f64de78c57e88150b6fafabe87dbd7bdd9868915cea8bd1b
                                        • Opcode Fuzzy Hash: 404374f2eb5c2e5540a7bdc06187d04f922396aa0ddea1259ae7fe0d23b77fc4
                                        • Instruction Fuzzy Hash: 85F0243260531427E63467A56C0AFA73BECD786B01F1406EEBA05870C1CFA1A94D87A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __alldvrm$_strrchr
                                        • String ID:
                                        • API String ID: 1036877536-0
                                        • Opcode ID: 81c2af9a51eac88d90566e98f63fd44f243beb22a756994565506ca33d5a461a
                                        • Instruction ID: 75069f608d0b8242c75729d56ac9953d5cb505c2986b1dd789bef76a63859a83
                                        • Opcode Fuzzy Hash: 81c2af9a51eac88d90566e98f63fd44f243beb22a756994565506ca33d5a461a
                                        • Instruction Fuzzy Hash: 83A13432E00286AFEB21CE28C8917AFBBE5EF55350F1841E9E595AB382C6748E41D750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __allrem.LIBCMT ref: 00B39E51
                                        • _memcmp.LIBVCRUNTIME ref: 00B39EF5
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B39F79
                                        • _memcmp.LIBVCRUNTIME ref: 00B3A014
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _memcmp$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                        • String ID:
                                        • API String ID: 3520290970-0
                                        • Opcode ID: b27616001a59e739db4513f138751f3b572cf48fa47b3820d9f6b92b53ae59ad
                                        • Instruction ID: ef718addd4d68c36404cf03adc846dfbae8136612b8149ea08f19d2ea60b01af
                                        • Opcode Fuzzy Hash: b27616001a59e739db4513f138751f3b572cf48fa47b3820d9f6b92b53ae59ad
                                        • Instruction Fuzzy Hash: F161AE71A20308CFC718EF28EC94B257BE5FB85324F20026AE54DC72B1DB75A984CB55
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 00B32757
                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800), ref: 00B3279B
                                        • SetFileTime.KERNEL32(?,?,?,00000000), ref: 00B3281C
                                        • CloseHandle.KERNEL32(?), ref: 00B32823
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: File$Create$CloseHandleTime
                                        • String ID:
                                        • API String ID: 2287278272-0
                                        • Opcode ID: 9afb5d0ef6476af500beeeffd57c8f956e59cdb0eeb2bb6684d89009c62cb1b9
                                        • Instruction ID: 924d2c686c8538f2118de1694d3bca6f3ca4d0b52c68f66b9f4d856e55bfd150
                                        • Opcode Fuzzy Hash: 9afb5d0ef6476af500beeeffd57c8f956e59cdb0eeb2bb6684d89009c62cb1b9
                                        • Instruction Fuzzy Hash: 2D41AC31248381AAE721DF24DC56FAABBE8AF85700F2409ADF5D097191C664AE4CDB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,00B44F6E,00000000,00000000,00B4579C,?,00B4579C,?,00000001,00B44F6E,23E85006,00000001,00B4579C,00B4579C), ref: 00B4BE4C
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B4BED5
                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00B4BEE7
                                        • __freea.LIBCMT ref: 00B4BEF0
                                          • Part of subcall function 00B4846D: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B44B84,?,0000015D,?,?,?,?,00B45703,000000FF,00000000,?,?), ref: 00B4849F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                        • String ID:
                                        • API String ID: 2652629310-0
                                        • Opcode ID: fbf1b42282d378749b27089472387ef067372f666abca890171e994bf8cfed75
                                        • Instruction ID: 3e324220c864686dfaa0064b8f28b2113b9ce08da432a2130020a8f2af225035
                                        • Opcode Fuzzy Hash: fbf1b42282d378749b27089472387ef067372f666abca890171e994bf8cfed75
                                        • Instruction Fuzzy Hash: 9C318F72A0021AABDB25DF64DC85EEE7BE5EB80710F1405A8FE0497250EB35DE54DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B374AD: __EH_prolog.LIBCMT ref: 00B374B2
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B3681E
                                          • Part of subcall function 00B374AD: new.LIBCMT ref: 00B3750B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe$Cyber.exe
                                        • API String ID: 3007126557-2023509382
                                        • Opcode ID: 47e2f471f47dadb698a07bd95e45c4ff83d61bea6e73db3f683d22970db8dd3a
                                        • Instruction ID: d11a6a4a0956e6a7e99ab4ad2d80740f3b90a0b4c22a076ea9eec5b227037871
                                        • Opcode Fuzzy Hash: 47e2f471f47dadb698a07bd95e45c4ff83d61bea6e73db3f683d22970db8dd3a
                                        • Instruction Fuzzy Hash: 85810370555345EFD724BB28AC92B297BE5EB46320F34C1EAF599A76B2CE705C80C710
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: __rar_
                                        • API String ID: 176396367-2561138058
                                        • Opcode ID: 72d7848e1d550462780d4b24d921749dde7082c69e0010db549e3b402d86c624
                                        • Instruction ID: 37431044fa4df6183bbfc5757455cefbb39e98dfb712164874dfc2ce462fbcae
                                        • Opcode Fuzzy Hash: 72d7848e1d550462780d4b24d921749dde7082c69e0010db549e3b402d86c624
                                        • Instruction Fuzzy Hash: 3A41D67280835479D634AB688DC6DEFB7DCDB85700F6418AAF9C5D3112D634DD48D2B2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: }
                                        • API String ID: 176396367-4239843852
                                        • Opcode ID: 71c34ee0812f02e60bfe61dd0406592a21763b2d8ed657f87f690bbebddcbe77
                                        • Instruction ID: fb01ae0cadc0d1a7fcef872619354e8aa244b94ee0ce77764a76731d60dca111
                                        • Opcode Fuzzy Hash: 71c34ee0812f02e60bfe61dd0406592a21763b2d8ed657f87f690bbebddcbe77
                                        • Instruction Fuzzy Hash: 0221D572504B166AD731EAA4CC45F6BB7DCDF41750F6004AAFA80E3142EB71DE48A3A6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Shell.Explorer$about:blank
                                        • API String ID: 0-874089819
                                        • Opcode ID: 8ceefbddee1fd9dc2aaa919cb90a4b7adc9912b3c638b8ef9368f9b8e81af3ba
                                        • Instruction ID: 58bf7ff77de07fcc236c6e52ccf4ceca96c0048871182b543094b89f43660d12
                                        • Opcode Fuzzy Hash: 8ceefbddee1fd9dc2aaa919cb90a4b7adc9912b3c638b8ef9368f9b8e81af3ba
                                        • Instruction Fuzzy Hash: 11217C71300716AFDB04DF60C991E66B7E9FF54711F3482A9B5458B291DB64EC04CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B341A3: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B341C2
                                          • Part of subcall function 00B341A3: GetProcAddress.KERNEL32(00B5FA8C,CryptUnprotectMemory), ref: 00B341D2
                                        • GetCurrentProcessId.KERNEL32(?,?,?,00B3421C), ref: 00B342AA
                                        Strings
                                        • CryptUnprotectMemory failed, xrefs: 00B342A2
                                        • CryptProtectMemory failed, xrefs: 00B34269
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressProc$CurrentProcess
                                        • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                        • API String ID: 2190909847-396321323
                                        • Opcode ID: d5735fed96add77b0051aece69eec62a2aad6f4952d92fa18cef1d299ee5cf31
                                        • Instruction ID: 22e377d96ffd242adbd98054266f0bf0efd47770086d337f25d8c0adac767c59
                                        • Opcode Fuzzy Hash: d5735fed96add77b0051aece69eec62a2aad6f4952d92fa18cef1d299ee5cf31
                                        • Instruction Fuzzy Hash: EB1104327122261BEB089A25DC11B7F77EADF85710F2485FDFC09AB152CF60AC458681
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _swprintf.LIBCMT ref: 00B33330
                                          • Part of subcall function 00B337C1: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B337D4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: __vswprintf_c_l_swprintf
                                        • String ID: %c:\
                                        • API String ID: 1543624204-3142399695
                                        • Opcode ID: dae7320c9897f371a3324758e32f6876298289fcb647d8286c3d02934a7a9e70
                                        • Instruction ID: 50f950374e28f7b60559375b6c304c273fc09d7dd8fda9f26de40b1a86119f8d
                                        • Opcode Fuzzy Hash: dae7320c9897f371a3324758e32f6876298289fcb647d8286c3d02934a7a9e70
                                        • Instruction Fuzzy Hash: 1501F563504311B98B30A7759C86E6BB7ECDF96B70F648496F884C7082FF30DA90C2A5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID: Cyber.exe
                                        • API String ID: 3519838083-2714003122
                                        • Opcode ID: a3eae3fbb4b337f01c428e9ff2e808144e8b49242d4f5f78b89f53bb4db70f4a
                                        • Instruction ID: fd3e307cf21cf5ff91d2c508cdb47290f14debf4e3a32ebab702d8d2b3561535
                                        • Opcode Fuzzy Hash: a3eae3fbb4b337f01c428e9ff2e808144e8b49242d4f5f78b89f53bb4db70f4a
                                        • Instruction Fuzzy Hash: 0011C170A952069ADB24BB749802FFE73E4DF15314F3144E9F81AE7182DF749A848A50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exe
                                        • API String ID: 3519838083-3224907921
                                        • Opcode ID: d5c59a2c8b640f94bcb02df14bb2142a69bcb2492fd3a286ac36a2a0ae06cb59
                                        • Instruction ID: 6a09f981ff0c1fb361b2d5926b207dfddcbd7c276e7ec42d35b2a8be0d37706c
                                        • Opcode Fuzzy Hash: d5c59a2c8b640f94bcb02df14bb2142a69bcb2492fd3a286ac36a2a0ae06cb59
                                        • Instruction Fuzzy Hash: D3F02872E245069FCB14EB7CAC01ABA7BF8DB0A310F2086FDE45AD3381EF3099004650
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _swprintf
                                        • String ID: z%s%02d$z%s%d
                                        • API String ID: 589789837-468824935
                                        • Opcode ID: d088c815c0420346c2d9ca612d524296ccfe6ff9d07fd69ac6542a01e326ac00
                                        • Instruction ID: 039961a686db94eae46d8a57c85101bbfec161388f5a7b3d62f940ab4a30fc91
                                        • Opcode Fuzzy Hash: d088c815c0420346c2d9ca612d524296ccfe6ff9d07fd69ac6542a01e326ac00
                                        • Instruction Fuzzy Hash: 7AF090B6901108AA9F14AF40CC42EEAB7EEEB49700F5041E1FE005B161EB719D5947B1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00B4B3BB: GetEnvironmentStringsW.KERNEL32 ref: 00B4B3C4
                                          • Part of subcall function 00B4B3BB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B4B3E7
                                          • Part of subcall function 00B4B3BB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B4B40D
                                          • Part of subcall function 00B4B3BB: _free.LIBCMT ref: 00B4B420
                                          • Part of subcall function 00B4B3BB: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B4B42F
                                        • _free.LIBCMT ref: 00B478B5
                                        • _free.LIBCMT ref: 00B478BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                        • String ID: `|
                                        • API String ID: 400815659-399934961
                                        • Opcode ID: 32e4dee226df781963f032b5fb8f01858130fcc6b7b14ed4cb9ae59488edf6cd
                                        • Instruction ID: a248c8e863d2ee6475e779150f16f67b7d7005074250345f6833909e3811fb14
                                        • Opcode Fuzzy Hash: 32e4dee226df781963f032b5fb8f01858130fcc6b7b14ed4cb9ae59488edf6cd
                                        • Instruction Fuzzy Hash: 30E0A032ACD81101A221323BBC49A5E17C98B82375B2002E5F830861D3DF60CB02F2E6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1645583791.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                        • Associated: 00000000.00000002.1645558633.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645607701.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B82000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1645977825.0000000000B87000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1646104006.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_b30000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: CommandLine
                                        • String ID: H&|
                                        • API String ID: 3253501508-463846233
                                        • Opcode ID: 843b124b47b00946b9b9b0e43f2be7ed7be58c5dc3f320284212459f44a61bea
                                        • Instruction ID: ade596e370deb68c2759cc46708bc5c105874b1fe7119ea3ca6d2cbcf3df68d8
                                        • Opcode Fuzzy Hash: 843b124b47b00946b9b9b0e43f2be7ed7be58c5dc3f320284212459f44a61bea
                                        • Instruction Fuzzy Hash: 6EB092788023018FD7008F30FC0C2043BA0BA0EA133C48096E806C7330DF340085CF08
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:0.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:69
                                        Total number of Limit Nodes:3
                                        execution_graph 36995 32d620b 36997 32d6227 36995->36997 36999 32d621e 36995->36999 36997->36999 37002 32d624f 36997->37002 37003 32d6132 36997->37003 36998 32d626f 37001 32d6132 105 API calls 36998->37001 36998->37002 36999->36998 37000 32d6132 105 API calls 36999->37000 36999->37002 37000->36998 37001->37002 37004 32d613f GetVersion 37003->37004 37005 32d61c7 37003->37005 37032 32d841b HeapCreate 37004->37032 37006 32d61cd 37005->37006 37007 32d61f9 37005->37007 37009 32d6192 37006->37009 37011 32d61e8 37006->37011 37050 32d71af 32 API calls 37006->37050 37007->37009 37054 32d99f0 31 API calls new[] 37007->37054 37009->36999 37010 32d6151 37010->37009 37044 32d9904 37 API calls 37010->37044 37051 32d6f5f 30 API calls new[] 37011->37051 37016 32d6189 37018 32d618d 37016->37018 37019 32d6196 GetCommandLineA 37016->37019 37017 32d61ed 37052 32d9958 35 API calls 37017->37052 37045 32d8478 6 API calls 37018->37045 37046 32d9d96 37 API calls 2 library calls 37019->37046 37023 32d61f2 37053 32d8478 6 API calls 37023->37053 37024 32d61a6 37047 32d6da3 34 API calls new[] 37024->37047 37027 32d61b0 37048 32d9b49 49 API calls new[] 37027->37048 37029 32d61b5 37049 32d9a90 48 API calls 2 library calls 37029->37049 37031 32d61ba 37031->37009 37033 32d843b 37032->37033 37034 32d8471 37032->37034 37055 32d82d3 57 API calls 37033->37055 37034->37010 37036 32d8440 37037 32d844a 37036->37037 37038 32d8457 37036->37038 37056 32d8520 HeapAlloc 37037->37056 37040 32d8474 37038->37040 37057 32d9067 5 API calls _mbstowcs_s 37038->37057 37040->37010 37041 32d8454 37041->37040 37043 32d8465 HeapDestroy 37041->37043 37043->37034 37044->37016 37045->37009 37046->37024 37047->37027 37048->37029 37049->37031 37050->37011 37051->37017 37052->37023 37053->37009 37054->37009 37055->37036 37056->37041 37057->37041 37058 32d5911 37061 32d5923 37058->37061 37062 32d5920 37061->37062 37064 32d592a new[] 37061->37064 37064->37062 37065 32d594f 37064->37065 37066 32d597c 37065->37066 37069 32d59bf 37065->37069 37072 32d59aa 37066->37072 37083 32d745b 29 API calls new[] 37066->37083 37068 32d5a2e RtlAllocateHeap 37071 32d59b1 37068->37071 37069->37072 37073 32d59e1 37069->37073 37070 32d5992 37084 32d88bc 5 API calls new[] 37070->37084 37071->37064 37072->37068 37072->37071 37086 32d745b 29 API calls new[] 37073->37086 37076 32d599d 37085 32d59b6 LeaveCriticalSection new[] 37076->37085 37077 32d59e8 37087 32d935f 6 API calls 2 library calls 37077->37087 37080 32d59fb 37088 32d5a15 LeaveCriticalSection new[] 37080->37088 37082 32d5a08 37082->37071 37082->37072 37083->37070 37084->37076 37085->37072 37086->37077 37087->37080 37088->37082

                                        Control-flow Graph

                                        APIs
                                        • HeapCreate.KERNEL32(00000000,00001000,00000000,032D6151,00000001), ref: 032D842C
                                          • Part of subcall function 032D82D3: GetVersionExA.KERNEL32 ref: 032D82F2
                                        • HeapDestroy.KERNEL32 ref: 032D846B
                                          • Part of subcall function 032D8520: HeapAlloc.KERNEL32(00000000,00000140,032D8454,000003F8), ref: 032D852D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: Heap$AllocCreateDestroyVersion
                                        • String ID:
                                        • API String ID: 2507506473-0
                                        • Opcode ID: ff0bea882abcf6a2267dd26b62b77729414d713be895d9ea65a447042062b6d5
                                        • Instruction ID: e06ef1e6ecdeb1b3f3ddf1434aea9d96a2fc20fac82078f65de4960b7e5a2067
                                        • Opcode Fuzzy Hash: ff0bea882abcf6a2267dd26b62b77729414d713be895d9ea65a447042062b6d5
                                        • Instruction Fuzzy Hash: 64F06D74A753129AEB20FB30BC0A77936A8DB40B52F14C866F540CC085FBA081C08652
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,-0000000F), ref: 032D5A36
                                          • Part of subcall function 032D745B: InitializeCriticalSection.KERNEL32(00000000,?,00000010,?,032D59E8,00000009), ref: 032D7498
                                          • Part of subcall function 032D745B: EnterCriticalSection.KERNEL32(00000010,00000010,?,032D59E8,00000009), ref: 032D74B3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$AllocateEnterHeapInitialize
                                        • String ID:
                                        • API String ID: 1616793339-0
                                        • Opcode ID: ad85d95606658c895f79851c0f7dde498165d690ca19585a6dbde7d1bf06c6bc
                                        • Instruction ID: d8d3e9c8c3fc70c982a01f477d0b45760d569d029aa90224dd18e758ecfad3e9
                                        • Opcode Fuzzy Hash: ad85d95606658c895f79851c0f7dde498165d690ca19585a6dbde7d1bf06c6bc
                                        • Instruction Fuzzy Hash: F321A931A60215ABDB10EF64EC82BDDB764EB01760F348116F415EF5C0D7F4A9C18694
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2255 32db7e4-32db7ef 2256 32db7f1-32db800 LoadLibraryA 2255->2256 2257 32db833-32db83a 2255->2257 2260 32db869-32db86b 2256->2260 2261 32db802-32db817 GetProcAddress 2256->2261 2258 32db83c-32db842 2257->2258 2259 32db852-32db85e 2257->2259 2258->2259 2265 32db844-32db84b 2258->2265 2262 32db865-32db868 2259->2262 2260->2262 2261->2260 2263 32db819-32db82e GetProcAddress * 2 2261->2263 2263->2257 2265->2259 2266 32db84d-32db850 2265->2266 2266->2259
                                        APIs
                                        • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,032DA02B,?,Microsoft Visual C++ Runtime Library,00012010,?,032E03C8,?,032E0418,?,?,?,Runtime Error!Program: ), ref: 032DB7F6
                                        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 032DB80E
                                        • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 032DB81F
                                        • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 032DB82C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                        • API String ID: 2238633743-4044615076
                                        • Opcode ID: 5f901437ba42ec008accc2cf16f18bedc726568a8cbf1487d743ab171439899d
                                        • Instruction ID: fd54543f0e9cef512bc08f4872f14712b027bf2bd3dd143f9a2a6ac9a9c1cfa2
                                        • Opcode Fuzzy Hash: 5f901437ba42ec008accc2cf16f18bedc726568a8cbf1487d743ab171439899d
                                        • Instruction Fuzzy Hash: 32017133B103469FC711EEF6BC8996ABAE9AA99990709843EE140C6115EB708481CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(032E88D8,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000000,?,032A6344,?,?,?,?,?,?,?), ref: 032A63D3
                                        • CryptAcquireContextA.ADVAPI32(032E88D8,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,032A6344,?,?,?,?,?,?,?), ref: 032A63ED
                                        Strings
                                        • Microsoft Enhanced Cryptographic Provider v1.0, xrefs: 032A63E1
                                        • Microsoft Enhanced Cryptographic Provider v1.0, xrefs: 032A63C7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: AcquireContextCrypt
                                        • String ID: Microsoft Enhanced Cryptographic Provider v1.0$Microsoft Enhanced Cryptographic Provider v1.0
                                        • API String ID: 3951991833-947817771
                                        • Opcode ID: 706704ffde56953b8ff370954ded3fb89e2dacc5f0d4e3e989ad9531a872cbe4
                                        • Instruction ID: 6b7ed05e81c65531a4f77b50ef2245ad5c2629d26c66424b8bd6474436761c25
                                        • Opcode Fuzzy Hash: 706704ffde56953b8ff370954ded3fb89e2dacc5f0d4e3e989ad9531a872cbe4
                                        • Instruction Fuzzy Hash: 81E086703F8B057BF630D51C7C0BF66354C9B80F0AF9884607656BD5C1E7E5A0C24605
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CryptCreateHash.ADVAPI32(00000000,00008004,00000000,00000000,00000000,?,?,?,?,?,?,?), ref: 032A6361
                                        • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?), ref: 032A6379
                                        • CryptDeriveKey.ADVAPI32(00000000,00006801,00000000,00000000,00000000,?,?,?,?,?,?,?), ref: 032A6399
                                        • CryptDestroyHash.ADVAPI32(00000000,?,?,?,?,?,?,?), ref: 032A63A3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$CreateDataDeriveDestroy
                                        • String ID:
                                        • API String ID: 2363288294-0
                                        • Opcode ID: a6750447408327188dbea983cc48576ef6686c45e3f3c8c07fe3a98206c596fb
                                        • Instruction ID: 6d3e2f2b3cd24b1cac7c9c7634f7b5748167ed8be84600cc527b2ef5abb5a3dd
                                        • Opcode Fuzzy Hash: a6750447408327188dbea983cc48576ef6686c45e3f3c8c07fe3a98206c596fb
                                        • Instruction Fuzzy Hash: A1116175610608FBDB10DEA4EC49FAA77BCAF84B01F188548FA059A1C0D772D581CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        • Cryptographic provider not available, xrefs: 032A64FB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Cryptographic provider not available
                                        • API String ID: 0-2417475821
                                        • Opcode ID: 8f08f7bcd7728fabad6250519d22ed60424aa146762ad57360e14b59015b4cf5
                                        • Instruction ID: 4bfb03d4b13a98778ba43c741081e3befea766c2a9d32e24cc21eb6bf53c2b87
                                        • Opcode Fuzzy Hash: 8f08f7bcd7728fabad6250519d22ed60424aa146762ad57360e14b59015b4cf5
                                        • Instruction Fuzzy Hash: 98713DB5D10609EFDF00DFA8C880BAEB7B5AF48700F2885A9D5156B340D775EA85CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 032D745B: InitializeCriticalSection.KERNEL32(00000000,?,00000010,?,032D59E8,00000009), ref: 032D7498
                                          • Part of subcall function 032D745B: EnterCriticalSection.KERNEL32(00000010,00000010,?,032D59E8,00000009), ref: 032D74B3
                                          • Part of subcall function 032D74BC: LeaveCriticalSection.KERNEL32(?,032D5B14,00000009,032D5B02,00000000,00000010,?,?,032D59E8,00000009), ref: 032D74C9
                                        • GetTimeZoneInformation.KERNEL32(0000000C,?,032A7B27,?,0000000B,0000000B,?,032D7BDE,032D55AA,032A70F1,?,032A7B27,00000001), ref: 032D7C3B
                                        • WideCharToMultiByte.KERNEL32(00000220,032E8B84,000000FF,0000003F,00000000,00000001,?,0000000B,0000000B,?,032D7BDE,032D55AA,032A70F1,?,032A7B27,00000001), ref: 032D7CD1
                                        • WideCharToMultiByte.KERNEL32(00000220,032E8BD8,000000FF,0000003F,00000000,00000001,?,0000000B,0000000B,?,032D7BDE,032D55AA,032A70F1,?,032A7B27,00000001), ref: 032D7D0A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$ByteCharMultiWide$EnterInformationInitializeLeaveTimeZone
                                        • String ID:
                                        • API String ID: 3442286286-0
                                        • Opcode ID: 02f65554fc33396bcff91258718822a0ab1b540e1d4ce7c3e624b6ad7cda4aa9
                                        • Instruction ID: e629743ac7e83cbdd7d763c6a08378c5f280caa88763b42e0a4459d34d82bf46
                                        • Opcode Fuzzy Hash: 02f65554fc33396bcff91258718822a0ab1b540e1d4ce7c3e624b6ad7cda4aa9
                                        • Instruction Fuzzy Hash: 2061F7715243619ED725FF2CF84AB697FA9B703720F28802EE4958E1C8D7B849C1CB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3268f341b4e54d1107b4290509f0d3e8732e921709d863d6eed5a2be66bfcb3c
                                        • Instruction ID: ba68300ccec9dc073eb7898f4d5878f5573c53dc7e744f6f43443adcaa1cafcc
                                        • Opcode Fuzzy Hash: 3268f341b4e54d1107b4290509f0d3e8732e921709d863d6eed5a2be66bfcb3c
                                        • Instruction Fuzzy Hash: 1E718379A10508AFCB04DF88D890EAEF7B5FB89311F14C199E919AB345D771EA81CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        • Cryptographic provider not available, xrefs: 032A6272
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Cryptographic provider not available
                                        • API String ID: 0-2417475821
                                        • Opcode ID: e903b09f80b6ca0c56179f7f1ad08415989598a1af43568597295fe7e91af830
                                        • Instruction ID: 73e995aadcd29322688113688c5fbb1acbc344726f13717ff0831398130e3adb
                                        • Opcode Fuzzy Hash: e903b09f80b6ca0c56179f7f1ad08415989598a1af43568597295fe7e91af830
                                        • Instruction Fuzzy Hash: 0C31A7B5E20605EFDF10DFA8C884B5EB7B8AB44300F18C569E8155B241D378DA90CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CryptDestroyKey.ADVAPI32(?,?,032A66B1,00000000), ref: 032A642A
                                        • CryptDestroyKey.ADVAPI32(E58BF845,?,032A66B1,00000000), ref: 032A644D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CryptDestroy
                                        • String ID:
                                        • API String ID: 1712904745-0
                                        • Opcode ID: d20a2ea6a9f08d8656694415bce5a12ccf7fc2e47e66cafe2d10b162087305f5
                                        • Instruction ID: e4e92cf7c040902a4f6e1afabd83c4d150cfc7aee38b31af46b2d8c87a094fd9
                                        • Opcode Fuzzy Hash: d20a2ea6a9f08d8656694415bce5a12ccf7fc2e47e66cafe2d10b162087305f5
                                        • Instruction Fuzzy Hash: 6101F678610608ABC711EF18E488BAA7BA6AF88364F18C458E8094F340D775E9C2CF80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,-00000010,?), ref: 032A61A5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CryptEncrypt
                                        • String ID:
                                        • API String ID: 1352496322-0
                                        • Opcode ID: f44fbe7a0a567c34e17f7bbe16abfe991869c609f4e3e071e372acc23098fc5e
                                        • Instruction ID: 88c09d5998c6f05ab4834a4acde5dea204303596102da1061ce55d8349843d71
                                        • Opcode Fuzzy Hash: f44fbe7a0a567c34e17f7bbe16abfe991869c609f4e3e071e372acc23098fc5e
                                        • Instruction Fuzzy Hash: B2212C78A10208EFDB04DF99C981F9DB7B5AF48700F24C598E9046B381D771EE41DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CreateInstance
                                        • String ID:
                                        • API String ID: 542301482-0
                                        • Opcode ID: 11ea491bea3708f43ec7837491da446e31b8c36ddc91d57f4e692ea79bf1adbd
                                        • Instruction ID: d4c84a9c78c8cdcdf4c265c9d622215c9d3c311bbbac545824d8a051d426bb1b
                                        • Opcode Fuzzy Hash: 11ea491bea3708f43ec7837491da446e31b8c36ddc91d57f4e692ea79bf1adbd
                                        • Instruction Fuzzy Hash: 43115A71014304AFD300CFA4CCC1B8BB7E8EB89354F108A1EF9589B2A0E774E544CB96
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31121e9b5cca719626609ef20683aae72816b1b12963c85bba04056dce081806
                                        • Instruction ID: f0a6ae4afe25fda5bf631730b46c68acddf0fdd720c6b0f1e3afdc3503380870
                                        • Opcode Fuzzy Hash: 31121e9b5cca719626609ef20683aae72816b1b12963c85bba04056dce081806
                                        • Instruction Fuzzy Hash: 41211834E20149EFCB04CF98C590AADF772FB84304F5482ADE815AB346D771EA82CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9e2ef67033ba6d4d810dc0e4fec7f88bfc11f56aeb117674b0ea60149618a56
                                        • Instruction ID: f52f64a7d116ca69d2083888fc396a561adec8de1325da1a5f80f54940aad468
                                        • Opcode Fuzzy Hash: a9e2ef67033ba6d4d810dc0e4fec7f88bfc11f56aeb117674b0ea60149618a56
                                        • Instruction Fuzzy Hash: 5811D774E30288EFCB14DF98C980BADB7B5BB44704F1482ACD9059B340E6B6ABC4CB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5eacb9fd10725beadb66ff13f79996f58e4937929d65c185208171e0becf7cb6
                                        • Instruction ID: 34beb5df5489ef5a2e05423a7dd6d8446358f4d9fdb6cb31233acc05906c7145
                                        • Opcode Fuzzy Hash: 5eacb9fd10725beadb66ff13f79996f58e4937929d65c185208171e0becf7cb6
                                        • Instruction Fuzzy Hash: 8AF01975D1020CEFCB04DF98D980DAD77B5EB88314F148258F90957344D671DE55CB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c15945b8c9172f792626062542ffcbc6e90df6a2ab0c99ccea2ff2823afd6426
                                        • Instruction ID: ada62c0d8c1a7ee79db9a809ba78a23daf11f75048f5fd68ad7ae55d9701404a
                                        • Opcode Fuzzy Hash: c15945b8c9172f792626062542ffcbc6e90df6a2ab0c99ccea2ff2823afd6426
                                        • Instruction Fuzzy Hash: FFF01975D1020CEFCB04DF98D984DAD77B5EB88310F148268F90957344E631DE55CB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35c97f82a6cfdcd3ce8ba4f0bab76fd2aeb01f684ea59514e5315c29d8156cd2
                                        • Instruction ID: 7e3326d6d97ca0758232ec114fe77a1ae2e8fb84275d158b1660f04610e0adbd
                                        • Opcode Fuzzy Hash: 35c97f82a6cfdcd3ce8ba4f0bab76fd2aeb01f684ea59514e5315c29d8156cd2
                                        • Instruction Fuzzy Hash: 39F01C74A20248EBCB04DF9CC98489DB3B5EB48354F2082ACED098B300D772EF81CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2eae5dfbcce140b27e1ed22a0f81fd1b398b1d8e738686f540406692dded399d
                                        • Instruction ID: 5c6bbfc0eefcd8ed8a4ab4216630100bf5192053964ed7a3cd7d4f2d1648e9f3
                                        • Opcode Fuzzy Hash: 2eae5dfbcce140b27e1ed22a0f81fd1b398b1d8e738686f540406692dded399d
                                        • Instruction Fuzzy Hash: ACE012B666414D6B8B44DFACEC81CAB77ED6B8C600B048208B90DC7241D534E9618BE0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2300effe24524036945decbc6e6a949d47dcfda41849c340fa61c75d765fbec3
                                        • Instruction ID: 776081a20921d6b5cb273ec0bcb33e192594a4c8e755d2317afa9dbed4b1ec1d
                                        • Opcode Fuzzy Hash: 2300effe24524036945decbc6e6a949d47dcfda41849c340fa61c75d765fbec3
                                        • Instruction Fuzzy Hash: 64D09EB665020D7BCB44DF89DC41D9B37ADAB4C750F404108FE0D8B241D572E96187E1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 985cb517f3b049a7a144ec09949d7f8b3cc2d11ca6444026d8e07fb7534048de
                                        • Instruction ID: 9a6a5e54e9fc94a7e6ab962406554b13ded7ce52fb5222e6f0314d099cb9fec9
                                        • Opcode Fuzzy Hash: 985cb517f3b049a7a144ec09949d7f8b3cc2d11ca6444026d8e07fb7534048de
                                        • Instruction Fuzzy Hash: C2E0EC3491020CEBCB00DF98C14469DBFB4EB44304F2085A8D8042B340D6725A85CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fe4ebf7a63e60fc22467c682cdab0241eaa7228eadbbfcbdc7f4c77f9a05a528
                                        • Instruction ID: 70037a5b5ea5737aba9f5076e80f894a2a564d582b7b9f7fe20ad094079d894c
                                        • Opcode Fuzzy Hash: fe4ebf7a63e60fc22467c682cdab0241eaa7228eadbbfcbdc7f4c77f9a05a528
                                        • Instruction Fuzzy Hash: E0C08CF612030CBF8B00EF8CCC40CAB33EDEB88610B008408B91CCB240D632F96087A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56942107f208eac211681176a3cb9138e4de494371c761b67b0e0cfbc9356bb7
                                        • Instruction ID: 80cf53429cfb7f19a57aa4f02a094b8643c1417c5e9a787389a970e8d6ad6d0e
                                        • Opcode Fuzzy Hash: 56942107f208eac211681176a3cb9138e4de494371c761b67b0e0cfbc9356bb7
                                        • Instruction Fuzzy Hash: 0CB09B7657031C678604DA98DC41C55339D5648510B404514BD0D4B200D571FA9047E5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 869 32a7ce6-32a7d06 call 32cc400 872 32a7d08-32a7d24 call 32a68fa 869->872 873 32a7d26 869->873 872->873 877 32a7d2b-32a7d3c 872->877 875 32a823b-32a8240 873->875 878 32a7d56-32a7d61 877->878 879 32a7e1e-32a7e25 878->879 880 32a7d67-32a7d73 878->880 883 32a7e32-32a7e4a call 32c47bc 879->883 884 32a7e27-32a7e30 879->884 881 32a7e19 880->881 882 32a7d79-32a7d9f 880->882 881->878 887 32a7e0b 882->887 888 32a7da1-32a7daf 882->888 885 32a7e51-32a7e8c call 32a678f call 32a7959 883->885 899 32a7e4c 883->899 884->885 904 32a7e92-32a7e9e 885->904 905 32a8205-32a822d call 32cc54b 885->905 898 32a7e10-32a7e16 887->898 888->887 892 32a7dfa-32a7e09 888->892 893 32a7dd8-32a7de7 888->893 894 32a7de9-32a7df8 888->894 895 32a7db6-32a7dbf 888->895 896 32a7dc7-32a7dd6 888->896 897 32a7dc5 888->897 892->898 893->898 894->898 895->897 896->898 897->898 898->881 899->875 907 32a7ebe-32a7eec 904->907 908 32a7ea0-32a7eb9 904->908 905->875 912 32a822f-32a8238 call 32c4792 905->912 910 32a7ef2-32a7f00 907->910 911 32a8200 907->911 908->911 910->911 913 32a81ee-32a81fd 910->913 914 32a80cc-32a80ed call 32d50cc 910->914 915 32a7f2d-32a7f8e call 32d53f0 * 2 call 32d50cc call 32d4a10 910->915 916 32a8163-32a818f call 32d53f0 call 32d50cc 910->916 917 32a7f07-32a7f28 call 32d50cc 910->917 918 32a8118-32a815e call 32d53f0 call 32d50cc call 32d4a10 910->918 919 32a7fb9-32a8013 call 32a678f call 32d53f0 910->919 920 32a81bd-32a81ec call 32d50cc call 32d4a10 910->920 921 32a80f2-32a8113 call 32d50cc 910->921 922 32a7f93-32a7fb4 call 32d50cc 910->922 923 32a8191-32a81bb call 32d53f0 910->923 924 32a8094-32a80c7 call 32d50cc call 32d4a10 910->924 912->875 913->911 914->911 915->911 916->911 917->911 918->911 961 32a8068-32a808c call 32d50cc 919->961 962 32a8015-32a8066 call 32d53f0 call 32d50cc 919->962 920->911 921->911 922->911 923->911 924->911 974 32a808f 961->974 962->974 974->911
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %.16g$%02d$%02d$%02d$%02d$%02d$%02d$%02d.%03d$%03d$%04d$R$R$d
                                        • API String ID: 0-238620251
                                        • Opcode ID: eb3d0b47ab6eadee69d6ac8b6e84c7bd45b5d6aef31cff4ee45b3ffbebfd84b5
                                        • Instruction ID: 0c95279f5278467d49aeb917ff366b3ce3a66e4e34b85dd2f684456c2fe7311c
                                        • Opcode Fuzzy Hash: eb3d0b47ab6eadee69d6ac8b6e84c7bd45b5d6aef31cff4ee45b3ffbebfd84b5
                                        • Instruction Fuzzy Hash: DFF16BB1D20619EFCB18DF98EC91AAEB771FF85304F188198E1166B301DB70AD95CB84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047EECF
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047EEDC
                                        • FSDK_GetFacePosition_C.CLIENT(00000000,?,?,?,?,?), ref: 1047EF9C
                                        • FSDK_CopyRect.CLIENT(00000000,?,?,?,?,?), ref: 1047EFC5
                                        • FSDK_CreateEmptyImage.CLIENT(?,00000000,?,?,?,?,?), ref: 1047EFCF
                                        • FSDK_ResizeImage.CLIENT(?,?,?), ref: 1047F021
                                          • Part of subcall function 10479E50: EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479E7F
                                          • Part of subcall function 10479E50: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479E8C
                                        • FSDK_FreeImage.CLIENT(?), ref: 1047F030
                                          • Part of subcall function 1047A350: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A37D
                                          • Part of subcall function 1047A350: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A38A
                                          • Part of subcall function 1047A350: Sleep.KERNEL32(0000000A), ref: 1047A396
                                          • Part of subcall function 1047A350: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A3A6
                                          • Part of subcall function 1047A350: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A3B2
                                          • Part of subcall function 1047A350: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A428
                                        • FSDK_GetImageWidth.CLIENT(?,?), ref: 1047F047
                                        • FSDK_GetImageHeight.CLIENT(?,?,?,?), ref: 1047F052
                                        • FSDK_CopyRect.CLIENT(?,?,?,?,?,?,?,?,?,?), ref: 1047F0A8
                                        • FSDK_FreeImage.CLIENT(?), ref: 1047F0B3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Image$Leave$Enter$CopyFreeRect$CreateEmptyFaceHeightPosition_ResizeSleepWidth
                                        • String ID:
                                        • API String ID: 1955235071-0
                                        • Opcode ID: cb5adecf170d7331977cbe7f5d4d242eca5d8b7a2676b3211ba6ef52db4264b3
                                        • Instruction ID: dac6747f0e3ea5a3f76de1016672b5078cec85578f32568d878405da189028f2
                                        • Opcode Fuzzy Hash: cb5adecf170d7331977cbe7f5d4d242eca5d8b7a2676b3211ba6ef52db4264b3
                                        • Instruction Fuzzy Hash: C071DD76604254AFCB00DF68D8C49ABB7B8EF89254F498A5DFD48C3254EA35EC14C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • FSDK_GetCameraList.CLIENT(?,?), ref: 10482756
                                          • Part of subcall function 10481960: CoCreateInstance.OLE32 ref: 104819B7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CameraCreateInstanceList
                                        • String ID:
                                        • API String ID: 3706761365-0
                                        • Opcode ID: bd1ed3d0f59112822debe1b7bcd5931fc437c6205249704635145c96a1a3eb26
                                        • Instruction ID: 1a15eb28baa3a5c01d9704aa0fdc7b0e2fc878f0827ea3cfb1498aff8da1f037
                                        • Opcode Fuzzy Hash: bd1ed3d0f59112822debe1b7bcd5931fc437c6205249704635145c96a1a3eb26
                                        • Instruction Fuzzy Hash: BD518DB1600612AFD300DFA9CCC1F5AB7A4FF48754F000A2AF959DB291E775E9058BE2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047AD83
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047ADBF
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047ADCC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$Leave
                                        • String ID: (
                                        • API String ID: 2801635615-3887548279
                                        • Opcode ID: ac119478c0b134ae366c77c70c98860ade39e0ac746c10ee45290c1cddc726d7
                                        • Instruction ID: c7359066373b7d06298698253afb210f378f16c2200cea3c3479800912c1b33b
                                        • Opcode Fuzzy Hash: ac119478c0b134ae366c77c70c98860ade39e0ac746c10ee45290c1cddc726d7
                                        • Instruction Fuzzy Hash: 1A515B755083908FC750DF69C4C4A9ABBE5FB89350F51892EF998D7351D735A804CB82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateCompatibleDC.GDI32(00000000), ref: 1047B0B0
                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 1047B0C8
                                        • FSDK_CreateEmptyImage.CLIENT(?), ref: 1047B0E0
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047B0EF
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047B100
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047B11B
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047B12C
                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000000,00000000), ref: 1047B181
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$BitsCreateEnterLeave$CompatibleEmptyImage
                                        • String ID:
                                        • API String ID: 920270848-0
                                        • Opcode ID: 2ea0a75bf63e110376244635f7973cd8fe6b9d6ed674ebc4d77f0409531f9743
                                        • Instruction ID: d6ccf82610254029b38548e579fc339457674982780c7e1757cb162a8d4f7628
                                        • Opcode Fuzzy Hash: 2ea0a75bf63e110376244635f7973cd8fe6b9d6ed674ebc4d77f0409531f9743
                                        • Instruction Fuzzy Hash: 718148B5604602AFD300CF68CCC5F5AB7E8FB88354F508A29F968D72A1E734E9158B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CompareStringW.KERNEL32(00000000,00000000,032DFFFC,00000001,032DFFFC,00000001,00000000,0332125C,032A70F1,?,032A7B27,?,0000000B,0000000B,?,032D7BDE), ref: 032DC9A8
                                        • CompareStringA.KERNEL32(00000000,00000000,032DFFF8,00000001,032DFFF8,00000001,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DC9C5
                                        • CompareStringA.KERNEL32(032A7B27,?,00000000,032D55AA,032D7BDE,?,00000000,0332125C,032A70F1,?,032A7B27,?,0000000B,0000000B,?,032D7BDE), ref: 032DCA23
                                        • GetCPInfo.KERNEL32(0000000B,00000000,00000000,0332125C,032A70F1,?,032A7B27,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCA74
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000009,00000000,?,00000000,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCAF3
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000001,00000000,?,0000000B,?,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCB54
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000009,032D7BDE,?,00000000,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCB67
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000001,032D7BDE,?,?,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCBB3
                                        • CompareStringW.KERNEL32(032A7B27,?,0000000B,?,?,00000000,?,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCBCB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: ByteCharCompareMultiStringWide$Info
                                        • String ID:
                                        • API String ID: 1651298574-0
                                        • Opcode ID: 37f3e6efa778ba772bb2e41537b7b805d6ef73a1afa677da4c0e8c2545e7354e
                                        • Instruction ID: 2ab46b61a89c1ca57ba3917b095bbf822433b5568096d86532fa6584abec895a
                                        • Opcode Fuzzy Hash: 37f3e6efa778ba772bb2e41537b7b805d6ef73a1afa677da4c0e8c2545e7354e
                                        • Instruction Fuzzy Hash: D571D27296026AEFCF21DF54DC459EFBFBAEF05610F08411AF851A6150D3758991CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LCMapStringW.KERNEL32(00000000,00000100,032DFFFC,00000001,00000000,00000000,74DEE860,032E9070,?,00000003,00000000,00000001,00000000,?,?,032D5800), ref: 032D79B2
                                        • LCMapStringA.KERNEL32(00000000,00000100,032DFFF8,00000001,00000000,00000000,?,?,032D5800,?), ref: 032D79CE
                                        • LCMapStringA.KERNEL32(?,?,00000000,00000001,00000000,00000003,74DEE860,032E9070,?,00000003,00000000,00000001,00000000,?,?,032D5800), ref: 032D7A17
                                        • MultiByteToWideChar.KERNEL32(?,032E9071,00000000,00000001,00000000,00000000,74DEE860,032E9070,?,00000003,00000000,00000001,00000000,?,?,032D5800), ref: 032D7A4F
                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,?,00000000), ref: 032D7AA7
                                        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 032D7ABD
                                        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 032D7AF0
                                        • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 032D7B58
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: String$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 352835431-0
                                        • Opcode ID: 3981dff938cb68d3715fee6fe74ab492bc45be76db5cb9b1126bb178bf9d359b
                                        • Instruction ID: 2134879734187533e9ff97d90a4b542c17f107a3c0ff15cee792606d295066ad
                                        • Opcode Fuzzy Hash: 3981dff938cb68d3715fee6fe74ab492bc45be76db5cb9b1126bb178bf9d359b
                                        • Instruction Fuzzy Hash: 88519F3291020AEFCF21DFA8DD45DDEBF79FB49750F248119F811A5190D37689A1DB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000010), ref: 032D9F74
                                        • GetStdHandle.KERNEL32(000000F4,032E03C8,00000000,?,00000000,00000010), ref: 032DA04A
                                        • WriteFile.KERNEL32(00000000), ref: 032DA051
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: File$HandleModuleNameWrite
                                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                        • API String ID: 3784150691-4022980321
                                        • Opcode ID: cd072b2b5448607a5255cffe38449968b2b21002811569ed01f8f3fb63f84dd3
                                        • Instruction ID: 0e93567448ce9d353feafe9854504952e7fb60b3cf77af3ee88e934ba3c03bc5
                                        • Opcode Fuzzy Hash: cd072b2b5448607a5255cffe38449968b2b21002811569ed01f8f3fb63f84dd3
                                        • Instruction Fuzzy Hash: 0331E432A203196FDF20FAA0ED46FEE73ADEF45701F544496F584EA040DBB0A6C58A51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 10002820: EnterCriticalSection.KERNEL32(039F7B88,C92926B1), ref: 1000284B
                                          • Part of subcall function 10002820: LeaveCriticalSection.KERNEL32(039F7B88,?), ref: 10002886
                                        • EnterCriticalSection.KERNEL32(039F7B88), ref: 10481B7A
                                        • LeaveCriticalSection.KERNEL32(039F7B88,?), ref: 10481B8C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: f1f3e02d398dff614bbaba9015382fd1469d8e91afc6ffb1ca9e9e495f73e14c
                                        • Instruction ID: c35444a3e42f5744798cf6f7d4096402c245c55fa44bd7bc8b684b2c57adbb63
                                        • Opcode Fuzzy Hash: f1f3e02d398dff614bbaba9015382fd1469d8e91afc6ffb1ca9e9e495f73e14c
                                        • Instruction Fuzzy Hash: AA51BD726003419FD700CFA4D8C4B9B77A8EF85314F04896EFD59AB391D775E9058BA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,032D61A6), ref: 032D9DB1
                                        • GetEnvironmentStrings.KERNEL32(?,?,?,?,032D61A6), ref: 032D9DC5
                                        • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,032D61A6), ref: 032D9DF1
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,032D61A6), ref: 032D9E29
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,032D61A6), ref: 032D9E4B
                                        • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,032D61A6), ref: 032D9E64
                                        • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,032D61A6), ref: 032D9E77
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 032D9EB5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                        • String ID:
                                        • API String ID: 1823725401-0
                                        • Opcode ID: 5b07b35ac52e4b9c3faeab9c5200a17a6263e92f6097e6905596eeb09ffe3259
                                        • Instruction ID: 3a2dce8f565e5aa714e75eb2dd7563a7149bdfad1216dc17703f869e352254e3
                                        • Opcode Fuzzy Hash: 5b07b35ac52e4b9c3faeab9c5200a17a6263e92f6097e6905596eeb09ffe3259
                                        • Instruction Fuzzy Hash: 6231D6729252666FDB20FEB4AC88C3BBADCEB85654719496BF581C3101EB618CC186E1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(?,?,?,?,039F7B88,10481BA1,?), ref: 10487CB0
                                        • LeaveCriticalSection.KERNEL32(?,?,039F7B88,10481BA1,?), ref: 10487CBD
                                        • EnterCriticalSection.KERNEL32(?,?,039F7B88,10481BA1,?), ref: 10487CD1
                                        • FSDK_LoadImageFromJpegBuffer.CLIENT(10481BA1,?,?,?,039F7B88,10481BA1,?), ref: 10487CE4
                                        • LeaveCriticalSection.KERNEL32(?), ref: 10487CF9
                                        • LeaveCriticalSection.KERNEL32(?), ref: 10487D00
                                        • LeaveCriticalSection.KERNEL32(?,?,039F7B88,10481BA1,?), ref: 10487D14
                                        • LeaveCriticalSection.KERNEL32(?,?,039F7B88,10481BA1,?), ref: 10487D1B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$Enter$BufferFromImageJpegLoad
                                        • String ID:
                                        • API String ID: 200253628-0
                                        • Opcode ID: eadc7dabae330b1e4ee7b01f00f74cf528976b24cda0229bc954e64f4b91a862
                                        • Instruction ID: 1cf7b8b2ecf15e425dc07e7959f2f36ad1c1937298f9fac8acba09b7154864bf
                                        • Opcode Fuzzy Hash: eadc7dabae330b1e4ee7b01f00f74cf528976b24cda0229bc954e64f4b91a862
                                        • Instruction Fuzzy Hash: 0201AD322007155BC2119AE9ACD0A3BB3ECEF825A17100A3FEA2593751CB29EC1496A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FSDK_GrabFrame.CLIENT(?,?), ref: 10482C54
                                        • FSDK_GetImageWidth.CLIENT(?,?), ref: 10482C6C
                                          • Part of subcall function 104796D0: EnterCriticalSection.KERNEL32(039F7CC8), ref: 104796F6
                                          • Part of subcall function 104796D0: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479709
                                          • Part of subcall function 104796D0: EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479736
                                          • Part of subcall function 104796D0: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479743
                                        • FSDK_GetImageHeight.CLIENT(?,?,?,?), ref: 10482C79
                                          • Part of subcall function 10479610: EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479636
                                          • Part of subcall function 10479610: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479649
                                          • Part of subcall function 10479610: EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479676
                                          • Part of subcall function 10479610: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479683
                                        • FSDK_GetImageBufferSize.CLIENT(00000000,?,00000001,?,?,?,?), ref: 10482C88
                                          • Part of subcall function 1047A710: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A737
                                          • Part of subcall function 1047A710: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A74A
                                        • FSDK_SaveImageToBuffer.CLIENT(?,00000000,00000001), ref: 10482CA9
                                          • Part of subcall function 1047A450: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A47F
                                        • FSDK_FreeImage.CLIENT(00000000), ref: 10482D45
                                        • FSDK_LoadImageFromBuffer.CLIENT(?,00000000,?,?,?,00000001), ref: 10482D5B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterImage$Leave$Buffer$FrameFreeFromGrabHeightLoadSaveSizeWidth
                                        • String ID:
                                        • API String ID: 323284270-0
                                        • Opcode ID: 90613e124439835aa11031671422e999170dbceeaaa703190c251c2283cc4866
                                        • Instruction ID: 6ade7c45e454cbfea0e34c06a52eda77a5351e9b1395a00308c621bd8a654651
                                        • Opcode Fuzzy Hash: 90613e124439835aa11031671422e999170dbceeaaa703190c251c2283cc4866
                                        • Instruction Fuzzy Hash: 5141A3755083819FC300CF69C89595BFBE9EFD5218F188A5EF8945B302E635F905CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E9D6
                                        • FSDK_DetectMultipleFaces_C.CLIENT(?,?,?,00003000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 1047EA62
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalDetectEnterFaces_MultipleSection
                                        • String ID:
                                        • API String ID: 623008298-0
                                        • Opcode ID: 41c6101af63cd79ef33955c945b6eebce20aa35b985912cd2c46e87cf21bc57e
                                        • Instruction ID: 8cc9be78462358c1b1a7baa8c56757b58ebe57af6950fe65786c037b197b73e3
                                        • Opcode Fuzzy Hash: 41c6101af63cd79ef33955c945b6eebce20aa35b985912cd2c46e87cf21bc57e
                                        • Instruction Fuzzy Hash: 1671D2B5A08301AFC7519F15C4886CABBE4FF89390F61CA1DF985A22A5E735D854CFC2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: bmp$png
                                        • API String ID: 0-2683608082
                                        • Opcode ID: bc060b78bbb31b77f36a51ad82d551ab9f04157b473e5f33bd9deec93b35b80b
                                        • Instruction ID: 0da2a6797d044ff1c287b3e5e4f72ff9b021147778cb11d765677702518960ec
                                        • Opcode Fuzzy Hash: bc060b78bbb31b77f36a51ad82d551ab9f04157b473e5f33bd9deec93b35b80b
                                        • Instruction Fuzzy Hash: F441E03260421A8BC710DF6CC891A9B73A5EF852A0B45866DEC59DB3A4EB34ED05C7C5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FSDK_DetectFace_C.CLIENT(?,?,00000000), ref: 1047DC3D
                                          • Part of subcall function 1047CF80: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047CFAD
                                        • FSDK_CreateEmptyImage.CLIENT(?), ref: 1047DCE8
                                        • FSDK_CreateEmptyImage.CLIENT(?), ref: 1047DCF5
                                        • FSDK_CopyRect.CLIENT(?,00000000,?,00000000,?,?), ref: 1047DD18
                                          • Part of subcall function 104798A0: EnterCriticalSection.KERNEL32(039F7CC8), ref: 104798CD
                                          • Part of subcall function 104798A0: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 104798DA
                                        • FSDK_ResizeImage.CLIENT(?), ref: 1047DD3E
                                          • Part of subcall function 10479E50: EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479E7F
                                          • Part of subcall function 10479E50: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479E8C
                                        • FSDK_FreeImage.CLIENT(?,?), ref: 1047DD44
                                          • Part of subcall function 1047A350: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A37D
                                          • Part of subcall function 1047A350: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A38A
                                          • Part of subcall function 1047A350: Sleep.KERNEL32(0000000A), ref: 1047A396
                                          • Part of subcall function 1047A350: EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A3A6
                                          • Part of subcall function 1047A350: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A3B2
                                          • Part of subcall function 1047A350: LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A428
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$Image$CreateEmpty$CopyDetectFace_FreeRectResizeSleep
                                        • String ID:
                                        • API String ID: 1584239638-0
                                        • Opcode ID: 32431101161bc63eeae1f27b67cf31aae6b57cc9f77f2532ed59786fc8a646bc
                                        • Instruction ID: d697fbcce99cf64e182a66e467409d49829819faf6b08d2d2ca3542ec38e5218
                                        • Opcode Fuzzy Hash: 32431101161bc63eeae1f27b67cf31aae6b57cc9f77f2532ed59786fc8a646bc
                                        • Instruction Fuzzy Hash: 5E41E5B9A00215ABCB01EF79C89589A77B8EF49294F118A58FC4597368F731AD10CFD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetStringTypeW.KERNEL32(00000001,032DFFFC,00000001,?,?,?,?,00000001,00000000,?,032C0188,00000000,00000008), ref: 032D631A
                                        • GetStringTypeA.KERNEL32(00000000,00000001,032DFFF8,00000001,?,?,?,?,00000001,00000000,?,032C0188,00000000,00000008), ref: 032D6334
                                        • GetStringTypeA.KERNEL32(?,00000000,032C0188,?,00000000,?,?,?,00000001,00000000,?,032C0188,00000000,00000008), ref: 032D6368
                                        • MultiByteToWideChar.KERNEL32(00000001,?,032C0188,?,00000000,00000000,?,?,?,00000001,00000000,?,032C0188,00000000,00000008), ref: 032D63A0
                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,032C0188,?,?,?,?,?,?,00000001,00000000,?,032C0188,00000000), ref: 032D63F6
                                        • GetStringTypeW.KERNEL32(00000000,?,00000000,00000000,?,?,?,?,?,00000001,00000000,?,032C0188,00000000), ref: 032D6408
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: StringType$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 3852931651-0
                                        • Opcode ID: 862246c862c2dacc319e6c0586e1500049c36059557999a6e2b03a8b75d51d81
                                        • Instruction ID: d28fb10d5cd59ab12e8009eac33d1e434cd2a990abfea37e4f4ffe5818edc0fb
                                        • Opcode Fuzzy Hash: 862246c862c2dacc319e6c0586e1500049c36059557999a6e2b03a8b75d51d81
                                        • Instruction Fuzzy Hash: 6F41A07291021AAFCF20EF94EC85EAE7F79FB05B50F548825F911E6140C3759995CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • HeapAlloc.KERNEL32(00000000,00002020,?,?,?,?,032D9533,?,00000010,?,00000009,00000009,?,032D59FB,00000010), ref: 032D9088
                                        • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,032D9533,?,00000010,?,00000009,00000009,?,032D59FB,00000010), ref: 032D90AC
                                        • VirtualAlloc.KERNEL32(00000000,MZP,00001000,00000004,?,?,032D9533,?,00000010,?,00000009,00000009,?,032D59FB,00000010), ref: 032D90C6
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,032D9533,?,00000010,?,00000009,00000009,?,032D59FB,00000010), ref: 032D9187
                                        • HeapFree.KERNEL32(00000000,00000000,?,?,032D9533,?,00000010,?,00000009,00000009,?,032D59FB,00000010), ref: 032D919E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: AllocVirtual$FreeHeap
                                        • String ID: MZP
                                        • API String ID: 714016831-2889622443
                                        • Opcode ID: 8d85663e4f34678a4ce6d5c2437b29ad8148577d6528a89bd60d1a7a08bf4905
                                        • Instruction ID: d45abb28c357eafc4c36180edf772c890ed8139b7be591b323920fb184883951
                                        • Opcode Fuzzy Hash: 8d85663e4f34678a4ce6d5c2437b29ad8148577d6528a89bd60d1a7a08bf4905
                                        • Instruction Fuzzy Hash: 6931BE71650712ABD320EF24FC4AB61B7A8FB54B66F148229F156DB2C4E771A8C0CB54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70451eef76624b0de39f03ee3b2fd22a378e1bf87b827dfa89bf301149391090
                                        • Instruction ID: a3bf85869d163ebc704c01e5e6f8ac566d93ceb0d17130f70dc169a92cb4dbdb
                                        • Opcode Fuzzy Hash: 70451eef76624b0de39f03ee3b2fd22a378e1bf87b827dfa89bf301149391090
                                        • Instruction Fuzzy Hash: 56413A74D04609DFCB04DFACD5989AEBBB1FF44310F24C299D809AB246D7B09A91CF80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualFree.KERNEL32(?,00100000,00004000,?,?,?,?,032D61F7,032D624B,?,?,?), ref: 032D84B0
                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,032D61F7,032D624B,?,?,?), ref: 032D84BB
                                        • HeapFree.KERNEL32(00000000,?,?,?,?,?,032D61F7,032D624B,?,?,?), ref: 032D84C8
                                        • HeapFree.KERNEL32(00000000,?,?,?,?,032D61F7,032D624B,?,?,?), ref: 032D84E4
                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,?,032D61F7,032D624B,?,?,?), ref: 032D8505
                                        • HeapDestroy.KERNEL32(?,?,032D61F7,032D624B,?,?,?), ref: 032D8517
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: Free$HeapVirtual$Destroy
                                        • String ID:
                                        • API String ID: 716807051-0
                                        • Opcode ID: 38726e4868ce4e67177399faff5d5519dc13a83e66d0e9d6eee4cb859fb07fbc
                                        • Instruction ID: 10c13cdb872617fc4cd5299df1876103769d4cec9e5cd00dbd0ea4f7c6d1def7
                                        • Opcode Fuzzy Hash: 38726e4868ce4e67177399faff5d5519dc13a83e66d0e9d6eee4cb859fb07fbc
                                        • Instruction Fuzzy Hash: F511C436640625EBDB31EF10FC8BF55B369FB40B21F668055FA40AB198C771A890CB14
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __ftol.LIBCMT ref: 032CC744
                                        • __ftol.LIBCMT ref: 032CC767
                                        • __ftol.LIBCMT ref: 032CC809
                                        • __ftol.LIBCMT ref: 032CC834
                                          • Part of subcall function 032B3491: GetSystemTimeAsFileTime.KERNEL32(032CC803,?,?,?,?,?,?,032CC803,?), ref: 032B349B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: __ftol$Time$FileSystem
                                        • String ID: d
                                        • API String ID: 1096039025-2564639436
                                        • Opcode ID: 761b166967b58485164e6a5308cbb9fc778a3f3862552ccd682fd11c040557bd
                                        • Instruction ID: 53f004d070216b4e07433c52c20873aa25f226fe808a7e1c0b8a0b410a2b8597
                                        • Opcode Fuzzy Hash: 761b166967b58485164e6a5308cbb9fc778a3f3862552ccd682fd11c040557bd
                                        • Instruction Fuzzy Hash: 02914E74E20249EBDB04DF98D554BAEB7B5FF48300F2882ACD409AB255D731EE86DB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetVersionExA.KERNEL32 ref: 032D82F2
                                        • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 032D8327
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 032D8387
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: EnvironmentFileModuleNameVariableVersion
                                        • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                        • API String ID: 1385375860-4131005785
                                        • Opcode ID: 22bd912b2044f4c6df43840c12d79c9beb8917d927b46a9a7e5d1e63a6b32b03
                                        • Instruction ID: 3895fbfb49d784c110070308c8a4300818134a903f1529dd496036b4790d07fb
                                        • Opcode Fuzzy Hash: 22bd912b2044f4c6df43840c12d79c9beb8917d927b46a9a7e5d1e63a6b32b03
                                        • Instruction Fuzzy Hash: 61316B76C35389ADEB71D770AC85BEE776C9B02604F2C44D9D18CE9441E6B0C6C6CB21
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FSDK_GetCameraList.CLIENT(?,?), ref: 10481D85
                                          • Part of subcall function 10481960: CoCreateInstance.OLE32 ref: 104819B7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CameraCreateInstanceList
                                        • String ID:
                                        • API String ID: 3706761365-0
                                        • Opcode ID: bf3630b42cd6c2b12d14b035839e08ea209910557bbbcd82c8b5f620f1b369d8
                                        • Instruction ID: cfe046ef8d2bdf2338a9a3570ab9782f56e5a0fb8c595193d8bc30a95d8822ff
                                        • Opcode Fuzzy Hash: bf3630b42cd6c2b12d14b035839e08ea209910557bbbcd82c8b5f620f1b369d8
                                        • Instruction Fuzzy Hash: 7B7192756002129FC710CFA9C8D1B5BB7E4FF49254F408A2AF959CB394DB34E805CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FSDK_CreateEmptyImage.CLIENT(?), ref: 1047A828
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A83D
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A84A
                                        • EnterCriticalSection.KERNEL32(039F7CC8,00000000), ref: 1047A861
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A873
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$CreateEmptyImage
                                        • String ID:
                                        • API String ID: 2128245604-0
                                        • Opcode ID: ee6e57a2855c52ef6de848a25a65c998a76047f60ff0dd2702b002a5eecdcf98
                                        • Instruction ID: 509fefbf82381f469b0a8038c0471bc8e9d4f6a339a04478e3e4f17e61e1c60e
                                        • Opcode Fuzzy Hash: ee6e57a2855c52ef6de848a25a65c998a76047f60ff0dd2702b002a5eecdcf98
                                        • Instruction Fuzzy Hash: 7A513AB9600215AFD700DF99D8C1EAAB3A9FF88220B158259FA1897351D735FC21CBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetStartupInfoA.KERNEL32(?), ref: 032D6E01
                                        • GetFileType.KERNEL32(00000480), ref: 032D6EAC
                                        • GetStdHandle.KERNEL32(-000000F6), ref: 032D6F0F
                                        • GetFileType.KERNEL32(00000000), ref: 032D6F1D
                                        • SetHandleCount.KERNEL32 ref: 032D6F54
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: FileHandleType$CountInfoStartup
                                        • String ID:
                                        • API String ID: 1710529072-0
                                        • Opcode ID: 0d1cf4907653dc2f9a493cbbf966bd40588ae4a3233b3a27ce22caf7cb0f9604
                                        • Instruction ID: e59b545e9ed1c8fd70b692231e2e120d1c1d6f2dcbd85c06aac92d1f0091d60d
                                        • Opcode Fuzzy Hash: 0d1cf4907653dc2f9a493cbbf966bd40588ae4a3233b3a27ce22caf7cb0f9604
                                        • Instruction Fuzzy Hash: AB5148719246028FDB20DB28E848B6577E4AF02324FA8866DC592CF2D1D7B5D9C5C790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 032B2F73
                                        • Sleep.KERNEL32(00000001), ref: 032B2F84
                                        • LockFile.KERNEL32(?,40000001,00000000,00000001,00000000), ref: 032B2FD8
                                        • LockFile.KERNEL32(?,40000002,00000000,000001FE,00000000), ref: 032B3038
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: FileLock$Sleep
                                        • String ID:
                                        • API String ID: 2837005644-0
                                        • Opcode ID: 973f42b78ead1c4897fa30b80ded556d43bc6ab2422a027e2ee083e9d8ef60b9
                                        • Instruction ID: badcfa2b078ceb724b442b241536324d998eefd3692c8850c14fdb352c51303a
                                        • Opcode Fuzzy Hash: 973f42b78ead1c4897fa30b80ded556d43bc6ab2422a027e2ee083e9d8ef60b9
                                        • Instruction Fuzzy Hash: F4512D74D1030AEBEF14CF94C948BEEBBB5BF44344F188958E6556B280C3B59A84CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InitializeCriticalSection.KERNEL32(?,C92926B1,?,00000000,?,?,?,?,?,?,?,00000000,10489818,000000FF,?,10478FD1), ref: 10478DD1
                                        • CreateThread.KERNEL32(00000000,00000000,10478AD0,00000000,00000000,00000000), ref: 10478E86
                                        • WaitForMultipleObjects.KERNEL32(00000004,?,00000001,000000FF,00000000,?,?,?,?,?,?,?,00000000,10489818,000000FF), ref: 10478EAF
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,10489818,000000FF,?,10478FD1,00000000), ref: 10478EC9
                                        • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,10489818,000000FF,?,10478FD1), ref: 10478EEC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$CloseCreateDeleteHandleInitializeMultipleObjectsThreadWait
                                        • String ID:
                                        • API String ID: 4171279598-0
                                        • Opcode ID: 30d992d9edeb862ea7a1d2a1083661565f2be4fba392d6aa5fca7bd3b2624a6e
                                        • Instruction ID: 8eeee27565cf44a78993134131de2de62473d43dd4855e91b06e7a4b1805b21c
                                        • Opcode Fuzzy Hash: 30d992d9edeb862ea7a1d2a1083661565f2be4fba392d6aa5fca7bd3b2624a6e
                                        • Instruction Fuzzy Hash: EC41AB766443219FD314CF68C8C5A5BBBE8FB89314F118A2EF995DB390E735E8018B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InitializeCriticalSection.KERNEL32(?,C92926B1,00000000,00000000,?,00000001,?,?,?,?,?,00000000,1048A073,000000FF,10476671,00000000), ref: 1047640C
                                        • CreateThread.KERNEL32(00000000,00000000,10476370,-00000010,00000000,00000000), ref: 104764BA
                                        • WaitForMultipleObjects.KERNEL32(00000004,00000000,00000001,000000FF,?,?,?,?,?,?,?,00000000,1048A073,000000FF,10476671,00000000), ref: 104764DC
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000,1048A073,000000FF,10476671,00000000), ref: 104764F7
                                        • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,1048A073,000000FF,10476671,00000000), ref: 10476516
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$CloseCreateDeleteHandleInitializeMultipleObjectsThreadWait
                                        • String ID:
                                        • API String ID: 4171279598-0
                                        • Opcode ID: 9eb4e2544d6041cd6caf9e0fa860e510a110f01166273196f4e0c571664b3f92
                                        • Instruction ID: 560ea3d4e31c105de58531bb6d863fc09ab62694bab1b2b71b3af35b13a77570
                                        • Opcode Fuzzy Hash: 9eb4e2544d6041cd6caf9e0fa860e510a110f01166273196f4e0c571664b3f92
                                        • Instruction Fuzzy Hash: A541AEB66442119FD304CF68CCC5B5BB7E9EB89210F118A3EF95587380EB39E8018B95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A37D
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A38A
                                        • Sleep.KERNEL32(0000000A), ref: 1047A396
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A3A6
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A3B2
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A428
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$Enter$Sleep
                                        • String ID:
                                        • API String ID: 950586405-0
                                        • Opcode ID: 9ca32be5b11babae6dcf91df8e73de1feb3847045585fb46c29e046e4abaec98
                                        • Instruction ID: 90dd1eae96cf8fa4f4cdec8bca8a950a19eef1d7d2e24308be06e4680f6674e0
                                        • Opcode Fuzzy Hash: 9ca32be5b11babae6dcf91df8e73de1feb3847045585fb46c29e046e4abaec98
                                        • Instruction Fuzzy Hash: C121BF352052209FD701CBE8C8C8FAA73A4EF8B395F558159F8089B3A1CB75AC41CBD2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FSDK_CreateEmptyImage.CLIENT(?), ref: 1047ACC6
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047ACDB
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047ACE8
                                        • EnterCriticalSection.KERNEL32(039F7CC8,00000000), ref: 1047ACFF
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047AD0C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$CreateEmptyImage
                                        • String ID:
                                        • API String ID: 2128245604-0
                                        • Opcode ID: cfc7296081174ad45ccdc0cae04a5483161d2e48bec5040934dfe8620b3d943b
                                        • Instruction ID: f19d35510496334d41cb43d60714776ab16cac3ba790b0b19f09912b87de54fd
                                        • Opcode Fuzzy Hash: cfc7296081174ad45ccdc0cae04a5483161d2e48bec5040934dfe8620b3d943b
                                        • Instruction Fuzzy Hash: A211B9766051289BC7118FACDCD4A9A7368FF86275B10835AFC2897390D739DD11C7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • TlsAlloc.KERNEL32(7500F87D,?,032C5B77,00000000,?,0329489B,00000000,00000000,?,?,?,032A663C,?), ref: 032B34FF
                                        • TlsGetValue.KERNEL32(00000000,7500F87D,?,032C5B77,00000000,?,0329489B,00000000,00000000,?,?,?,032A663C,?), ref: 032B3534
                                        • new[].LIBCMTD ref: 032B354B
                                        • TlsSetValue.KERNEL32(00000000,00000000), ref: 032B3583
                                        • TlsSetValue.KERNEL32(00000000,00000000), ref: 032B35C3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: Value$Allocnew[]
                                        • String ID:
                                        • API String ID: 2211819836-0
                                        • Opcode ID: 69e63d1e550f62e8c5be25563adb97fdd49251a5b33a7c244b61a2072bb80338
                                        • Instruction ID: 700584ebf693f9a93334e048c1eb6b5496f8acae642df4f2184de080e8431182
                                        • Opcode Fuzzy Hash: 69e63d1e550f62e8c5be25563adb97fdd49251a5b33a7c244b61a2072bb80338
                                        • Instruction Fuzzy Hash: A82171B8D21308EFDB11FFA4F909B9977B9AB08745F14C198E9044B244D7719AC0DB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479636
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479649
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479676
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479683
                                        • EnterCriticalSection.KERNEL32(039F7CC8,?,?), ref: 104796A8
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 104796B5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 76892d84bf91ee9d4300047281973d6314945a73898fbf01d4b74be405d6b4d5
                                        • Instruction ID: 87dc2047c837c36683ac67caabaa73f044e5c1324f9c7faf65b0b767b33fcc96
                                        • Opcode Fuzzy Hash: 76892d84bf91ee9d4300047281973d6314945a73898fbf01d4b74be405d6b4d5
                                        • Instruction Fuzzy Hash: 8411C83A60A5309FC711DB6CD8D0DDA73A4EF862A4716825AED0097364DB34AC01CBD5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 104796F6
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479709
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479736
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479743
                                        • EnterCriticalSection.KERNEL32(039F7CC8,?,?), ref: 10479768
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479775
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 38dd3317922c336dccb9dfcc2842207fa7377758e717ac8e4b5e73a02c268c31
                                        • Instruction ID: 0b81767722b84b08464a3b61e42addaa0052c2e12ecb91a5496d681d8d12e96e
                                        • Opcode Fuzzy Hash: 38dd3317922c336dccb9dfcc2842207fa7377758e717ac8e4b5e73a02c268c31
                                        • Instruction Fuzzy Hash: 3E11C83A609530DFC711DF6CD8D4E9A73A4FF4A2A1745825AEC0097364D734AC01CBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7C28,?,?,?,?,1047C4E5,?,?), ref: 10488FB0
                                        • LeaveCriticalSection.KERNEL32(039F7C28,?,?,?,?,1047C4E5,?,?), ref: 10488FC3
                                        • EnterCriticalSection.KERNEL32(039F7B68,?,?,?,?,1047C4E5,?,?), ref: 10488FCC
                                        • LeaveCriticalSection.KERNEL32(039F7B68,?,?,?,?,1047C4E5,?,?), ref: 10488FDC
                                        • EnterCriticalSection.KERNEL32(039F7D88,?,?,?,?,1047C4E5,?,?), ref: 10488FE5
                                        • LeaveCriticalSection.KERNEL32(039F7D88,?,?,?,?,1047C4E5,?,?), ref: 10488FF2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: c5aebfbb2ace6fd6b796bfea815704cceac95b22b98f630d030739a9a27a12f9
                                        • Instruction ID: 97f982028332aa2ca13a57828253376a2217caef491ac7d7a88a32da92e61417
                                        • Opcode Fuzzy Hash: c5aebfbb2ace6fd6b796bfea815704cceac95b22b98f630d030739a9a27a12f9
                                        • Instruction Fuzzy Hash: 2F01263240B7B84FD7029BA92CD045FFB99AD5751074A489FEA50A3311DB14DC00C7A6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(00000001,?,032DB8E5,032DA184,?,032D6514,00000000,?,00000001,00000800,032A1E33,?,?,032D6CFC,?,?), ref: 032D998B
                                        • TlsGetValue.KERNEL32(?,?,032D6CFC,?,?,?,032D672C,00000000,032B2B04,00000000), ref: 032D9999
                                        • SetLastError.KERNEL32(00000000,?,?,032D6CFC,?,?,?,032D672C,00000000,032B2B04,00000000), ref: 032D99E5
                                          • Part of subcall function 032D6FB3: HeapAlloc.KERNEL32(00000008,00000000,00000000,00000000,00000000,00000000,032B2B04,00000000), ref: 032D70A9
                                        • TlsSetValue.KERNEL32(00000000,?,?,032D6CFC,?,?,?,032D672C,00000000,032B2B04,00000000), ref: 032D99BD
                                        • GetCurrentThreadId.KERNEL32 ref: 032D99CE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue$AllocCurrentHeapThread
                                        • String ID:
                                        • API String ID: 2020098873-0
                                        • Opcode ID: fc9e34d854ab0635c548f7281946cc7ef1dd449bf041df8b5a527acaf7c0752e
                                        • Instruction ID: f95c1215dce265918fb450d5b4fb588ae1ba465b03dd61fdc2414f1eaa52c349
                                        • Opcode Fuzzy Hash: fc9e34d854ab0635c548f7281946cc7ef1dd449bf041df8b5a527acaf7c0752e
                                        • Instruction Fuzzy Hash: DAF0BB36956B129BD7317B34B80E75A3F64EF40BB27048215F582DA294DB6588C24A91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DeleteCriticalSection.KERNEL32(00000000,?,?,032D995D,032D61F2,032D624B,?,?,?), ref: 032D7423
                                          • Part of subcall function 032D5A4B: HeapFree.KERNEL32(00000000,?,00000000,00000010,?,?,032D59E8,00000009), ref: 032D5B1F
                                        • DeleteCriticalSection.KERNEL32(?,?,032D995D,032D61F2,032D624B,?,?,?), ref: 032D743E
                                        • DeleteCriticalSection.KERNEL32 ref: 032D7446
                                        • DeleteCriticalSection.KERNEL32 ref: 032D744E
                                        • DeleteCriticalSection.KERNEL32 ref: 032D7456
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalDeleteSection$FreeHeap
                                        • String ID:
                                        • API String ID: 447823528-0
                                        • Opcode ID: 1e5c3475a6178a485b33bc87a3c41e6534b1b727dabb0413258814aec6d8f3e6
                                        • Instruction ID: ba440e7a59aa780c78f37884f7ab78a73a2769c2b74569f9ee312d9cfab84cb3
                                        • Opcode Fuzzy Hash: 1e5c3475a6178a485b33bc87a3c41e6534b1b727dabb0413258814aec6d8f3e6
                                        • Instruction Fuzzy Hash: 1CF05E37C35011568E36FA5DFC8E88AEE619ED665432E807AD888564248975CCE18DE4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: __aulldiv__aullrem
                                        • String ID: -$0123456789ABCDEF0123456789abcdef
                                        • API String ID: 3839614884-3460398327
                                        • Opcode ID: 5e465dcf58afd6457e1525a7c3df8a9db25ac65dc0b1532d866f191fcbd8f776
                                        • Instruction ID: 6f736edd5777b93a7646ca545fe9187444cae95938ea4f312d99f9a42fbbb252
                                        • Opcode Fuzzy Hash: 5e465dcf58afd6457e1525a7c3df8a9db25ac65dc0b1532d866f191fcbd8f776
                                        • Instruction Fuzzy Hash: 02510670A5916A8FDB69CF28CD50BEEBBB1BB49344F1481E9D51DA7244D7319AC0CF80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleA.KERNEL32(KERNEL32,032D53A9), ref: 032D7526
                                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 032D7536
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: IsProcessorFeaturePresent$KERNEL32
                                        • API String ID: 1646373207-3105848591
                                        • Opcode ID: 67f41b303c16c29c336b283b92b38126fa03fb5eb527e049f414147c127f89ea
                                        • Instruction ID: 82b3881b342461298e50215e77d4e6ad7094dcf3f36073b4578a3355ca4c92e3
                                        • Opcode Fuzzy Hash: 67f41b303c16c29c336b283b92b38126fa03fb5eb527e049f414147c127f89ea
                                        • Instruction Fuzzy Hash: 95C012207A16035DD960AF76AC0F729141C5F40A03F0480106916E10C4EA94C1814121
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f117e65a058188dbac0e90d0d7dce82d7058917e857ec2fc1cf94b61d57d2582
                                        • Instruction ID: db97f09f4c996652e9b329ffad8e7748f278faf82213819e491bea6264db8fc1
                                        • Opcode Fuzzy Hash: f117e65a058188dbac0e90d0d7dce82d7058917e857ec2fc1cf94b61d57d2582
                                        • Instruction Fuzzy Hash: 1D91F871D21615AECF11FB68DC449DEBBB8EB06760F384216F814BA184D7B18DC0CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: __ftol
                                        • String ID:
                                        • API String ID: 495808979-0
                                        • Opcode ID: 704c651b27ea79fffe48b6bd6682a329a352f00c860418cdb98322812df47f85
                                        • Instruction ID: b01367a48216cf111fb50496b05c73e09cec27d45fc41bd80283f393a117c607
                                        • Opcode Fuzzy Hash: 704c651b27ea79fffe48b6bd6682a329a352f00c860418cdb98322812df47f85
                                        • Instruction Fuzzy Hash: 20D117B4E20659DFDB68DF58CD50BAAB7B1BF88200F1482D9D44AAB244D7319EC1DF42
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,?,00000000), ref: 032DA25E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: a658e733f238f0b3e42875bb00d94364eab8d934e6d06bf1072b7cc695fe7c4b
                                        • Instruction ID: cbde63e8a5895d58871c4f5af39567d6d4490c602922ec44ab447e0061d917a7
                                        • Opcode Fuzzy Hash: a658e733f238f0b3e42875bb00d94364eab8d934e6d06bf1072b7cc695fe7c4b
                                        • Instruction Fuzzy Hash: 1A518D35920249EFCB11DFA9D888E9DBBB4FF45340F1481A6E816DB251D7B1DAD0CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,00000004,10000080,00000000,?,?,032A1B3F,00000000,00000000), ref: 032B277F
                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000004,10000080,00000000), ref: 032B27A4
                                        • CreateFileA.KERNEL32(00000000,C0000000,00000003,00000000,00000004,10000080,00000000,?,?,032A1B3F,00000000,00000000), ref: 032B2801
                                        • CreateFileA.KERNEL32(00000000,80000000,00000003,00000000,00000004,10000080,00000000), ref: 032B2826
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 6490e658c1d4fadd26f575ec0532bcb91e00a5e08c528e0afe32544868ab10cb
                                        • Instruction ID: 43a2caba9a533cd2e800e758a5a6796733f7fa94db880851513b6e4d1017cc2d
                                        • Opcode Fuzzy Hash: 6490e658c1d4fadd26f575ec0532bcb91e00a5e08c528e0afe32544868ab10cb
                                        • Instruction Fuzzy Hash: 993140B4950305FBEB20DFA0ED15BDE7774AB08750F204A54F6117F2C0D6B5AA81CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000002,10000000,00000000), ref: 032B28BA
                                        • Sleep.KERNEL32(00000064), ref: 032B28DC
                                        • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,10000000,00000000), ref: 032B2915
                                        • Sleep.KERNEL32(00000064), ref: 032B2937
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CreateFileSleep
                                        • String ID:
                                        • API String ID: 2694422964-0
                                        • Opcode ID: 1d1f60459f60f42b237ba4e6443200c3b5b17bf11cd68d35a6a189929e276f0d
                                        • Instruction ID: 27208a3dbbb0f109362a6285194bb7ecfa24ddb7409bd643264e57ed01b067c0
                                        • Opcode Fuzzy Hash: 1d1f60459f60f42b237ba4e6443200c3b5b17bf11cd68d35a6a189929e276f0d
                                        • Instruction Fuzzy Hash: D5316FB4E1030AEBEB10DFA0ED49BEEB774AB48354F248519E6157B2C0D3749A81CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,032A1B6F), ref: 032B32D9
                                        • GetFullPathNameW.KERNEL32(00000000,?,00000000,?), ref: 032B3315
                                        • GetFullPathNameA.KERNEL32(032A1B6F,00000000,00000000,032A1B6F,?,?,?,?,?,032A1B6F), ref: 032B3350
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: FullNamePath
                                        • String ID:
                                        • API String ID: 608056474-0
                                        • Opcode ID: 89318c0b586d57c85c20398d48e257a75730bee49018f05ed9dd61098d71f2ed
                                        • Instruction ID: 5359e6200f0d2a628ce90cf4bf529d4b0e1e144561cd46f47fc59eadf05ade2f
                                        • Opcode Fuzzy Hash: 89318c0b586d57c85c20398d48e257a75730bee49018f05ed9dd61098d71f2ed
                                        • Instruction Fuzzy Hash: B73101B9D20209EFDB00EFE4DC45BEFB778AF48341F048558E605AB240E775A684CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000001,00000000,?,0000000B,?,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCB54
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000009,032D7BDE,?,00000000,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCB67
                                        • MultiByteToWideChar.KERNEL32(0000000B,00000001,032D7BDE,?,?,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCBB3
                                        • CompareStringW.KERNEL32(032A7B27,?,0000000B,?,?,00000000,?,00000000,?,0000000B,0000000B,?,032D7BDE,032D55AA), ref: 032DCBCB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$CompareString
                                        • String ID:
                                        • API String ID: 376665442-0
                                        • Opcode ID: 7cd5335175a7f6e2fbdb09ff15b568954deec876eae11fc438264bdc0509a49e
                                        • Instruction ID: 28de9d59319381a0208b6dcde95d4cdaa755fc69bd295e1d3231d970bc1fc1ab
                                        • Opcode Fuzzy Hash: 7cd5335175a7f6e2fbdb09ff15b568954deec876eae11fc438264bdc0509a49e
                                        • Instruction Fuzzy Hash: 69213832D5021AEBCF219F94DC45ADEBFB6FF48760F144169FA1172160C3729A61DBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DeleteFileW.KERNEL32(00000000), ref: 032B2593
                                        • Sleep.KERNEL32(00000064), ref: 032B25B5
                                        • DeleteFileA.KERNEL32(00000000), ref: 032B25D6
                                        • Sleep.KERNEL32(00000064), ref: 032B25F8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: DeleteFileSleep
                                        • String ID:
                                        • API String ID: 3161721237-0
                                        • Opcode ID: 16278e0b1aa7cc29af4fca02c3eccd933995a9b4bd9c2a2cc556f77dfe13c7f1
                                        • Instruction ID: 87beb82343e2cf80705b50e28c6524ecb1725b74aff5902594f6df2b6f427d15
                                        • Opcode Fuzzy Hash: 16278e0b1aa7cc29af4fca02c3eccd933995a9b4bd9c2a2cc556f77dfe13c7f1
                                        • Instruction Fuzzy Hash: AD112B78E10309EBDF08EFA4D958BEDBBB4EF44349F1484A4E90697280D679A6D1DB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100020EC
                                        • ResetEvent.KERNEL32(?), ref: 100020F2
                                        • SetEvent.KERNEL32(?), ref: 1000210E
                                        • ExitThread.KERNEL32 ref: 1000211C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: Event$ExitObjectResetSingleThreadWait
                                        • String ID:
                                        • API String ID: 3992486658-0
                                        • Opcode ID: 0d5c412468ae82bbd9e1cf0dccf03b004b927e548126a12a55d26bfefd11e042
                                        • Instruction ID: bd623185f113e5bb64da8050b67e750535d759db64136f92daf2ec19560da285
                                        • Opcode Fuzzy Hash: 0d5c412468ae82bbd9e1cf0dccf03b004b927e548126a12a55d26bfefd11e042
                                        • Instruction Fuzzy Hash: 57F0B771504710DFC631DFAACCC481BB3FCBB8A6503108E1EE2A693665D735F9448BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: Info
                                        • String ID: $
                                        • API String ID: 1807457897-3032137957
                                        • Opcode ID: 7ce1851318201c88d4483f95fb14971e71bd546b55fb20886312e8d2c68141f3
                                        • Instruction ID: 59412a2832e2238fc6df2342511fb22350ec6a2739e2a61ea63a1405ee919942
                                        • Opcode Fuzzy Hash: 7ce1851318201c88d4483f95fb14971e71bd546b55fb20886312e8d2c68141f3
                                        • Instruction Fuzzy Hash: B4415B334242581BFB21D628DC6ABF77FA99B06B00F1D04E5E189CB252C2B545C4CBE3
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTempPathW.KERNEL32(00000118,?), ref: 032B2A49
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: PathTemp
                                        • String ID: %s\sqlite_
                                        • API String ID: 2920410445-921541735
                                        • Opcode ID: beacd156b3fa0a9615c8e3d8f71f3044038c69e25d585973276ec43a7f0ad264
                                        • Instruction ID: da3bce5a95f8fab571d271be629b07b1ee99e40395549deeb9c2cc994e9887e2
                                        • Opcode Fuzzy Hash: beacd156b3fa0a9615c8e3d8f71f3044038c69e25d585973276ec43a7f0ad264
                                        • Instruction Fuzzy Hash: 3C41A175D20348EBCB25EB64DC45BED77B8AF49344F0484A4E6096B244E7B09B84CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: bmp$jpg
                                        • API String ID: 0-1510245739
                                        • Opcode ID: 7ca64423effc136d681f63f7e55a2ce00f8a71e7e8811cf4dbf04aa95efd3a52
                                        • Instruction ID: 73b3301b13cee14f46ffe5ab25f79dbb17a0f0cd1ab5a7258e37b45804d9b3c6
                                        • Opcode Fuzzy Hash: 7ca64423effc136d681f63f7e55a2ce00f8a71e7e8811cf4dbf04aa95efd3a52
                                        • Instruction Fuzzy Hash: 9F31CE356002469BC7049F3CCC82B9B73A5EF85694F448A68FA5ACB394EB35ED04C7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479AFD
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479B3F
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479B4C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$Leave
                                        • String ID:
                                        • API String ID: 2801635615-0
                                        • Opcode ID: 6790f56543b1e76576b668c62222a4a9917cbd5316ab94b37fadc3e2c4a5dfeb
                                        • Instruction ID: 107012973b54b92222b946045c4fabc2edeb7ca9a369cdeb93c412b0909f817e
                                        • Opcode Fuzzy Hash: 6790f56543b1e76576b668c62222a4a9917cbd5316ab94b37fadc3e2c4a5dfeb
                                        • Instruction Fuzzy Hash: C641B776605120AFCB14CB59E8D4DAB77A8FF49260746829DFD098B351EB35EC40CBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E1FD
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E20A
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E2C4
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E2D1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 613e98e9ad0844572ab4b3f1a748880e811d262642f590a13d11fc70483c516c
                                        • Instruction ID: bd883383cb906c35b3cfa82454994a2aed3cb22203392ace04cf15ebbea08c2a
                                        • Opcode Fuzzy Hash: 613e98e9ad0844572ab4b3f1a748880e811d262642f590a13d11fc70483c516c
                                        • Instruction Fuzzy Hash: 1131D475A046148FC720DF69D8C4A9673A8EF49364F15C29AEC18973A2DB34EC01CBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E0CD
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E0E0
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E186
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E193
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 9ffc5ca7f20fa6ecc158f59b426f11db0a58120e01838d34663ff2162fde6c50
                                        • Instruction ID: 568f6f4d3b749344a23381cd50d6ad36a7f1c415d48dc37413d668ceb818ab5a
                                        • Opcode Fuzzy Hash: 9ffc5ca7f20fa6ecc158f59b426f11db0a58120e01838d34663ff2162fde6c50
                                        • Instruction Fuzzy Hash: 8C31E9766042249BD720DB69DCC2A9BB3A4EB49365F45835EFC1997390EB34EC00C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 104798CD
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 104798DA
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479985
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479992
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 15ca3077493405f05bef9e05f36e3d2a144daeb92ce1f1f5fd40e54387a1f3b6
                                        • Instruction ID: 3557f878aee3a32a1c86cca5e5322e467e0c3158bcf8b663bc7c7c28b9e6c153
                                        • Opcode Fuzzy Hash: 15ca3077493405f05bef9e05f36e3d2a144daeb92ce1f1f5fd40e54387a1f3b6
                                        • Instruction Fuzzy Hash: 8E318FBA6041249FDB10CFA8D8C4E9A73A8EF8A265F15825DFD18D73A0CB34AC41C7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 104797BD
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 104797CA
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479875
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479882
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 7c030649d0e155455f318ce43d6d52c3a6ad763e02f7e2ed4f857c7961b812b2
                                        • Instruction ID: 98943d90449852eef73d6c3c909c521c1b789978ac40d1e80b83b8bb0e813617
                                        • Opcode Fuzzy Hash: 7c030649d0e155455f318ce43d6d52c3a6ad763e02f7e2ed4f857c7961b812b2
                                        • Instruction Fuzzy Hash: DA31927A7041249FCB10DF68D8C4E9A73A8EB4A265F15825AFC18DB3A1CB35AC41C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 104799DF
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 104799EC
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479A9C
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479AA9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: ebd775eba17f65582cd434d8283d8bf67745e1ef93449b07f169e9d1f907711b
                                        • Instruction ID: 0c170e3a6439466ff6dee443cc8ed890f9ad80ec06c387370bc8c808c7fffa14
                                        • Opcode Fuzzy Hash: ebd775eba17f65582cd434d8283d8bf67745e1ef93449b07f169e9d1f907711b
                                        • Instruction Fuzzy Hash: 0931047A2051648FCB00DFA8D8C4A9A77A4FF86264F41C28EEC5897364CB34AC11C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479C6F
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479C7C
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479D1A
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479D27
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: a21f3b9ab9e061c2cf56a47291b24d50f869a7e58653f501f21c3068648cb6cc
                                        • Instruction ID: 1fa6a48007ad6c089c3b16b1bd2a6d7c37b83f5da078e440483b2327ec23081b
                                        • Opcode Fuzzy Hash: a21f3b9ab9e061c2cf56a47291b24d50f869a7e58653f501f21c3068648cb6cc
                                        • Instruction Fuzzy Hash: 6C31D43A6051248FCB21DF6CD8C4AAAB3A4EB46265F51825AEC18973A5CB34AD05C7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479E7F
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479E8C
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479F28
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479F35
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: aa712440c99e400ad3112f1de180d7fa4fd214528e926804a7b6df31602a9f11
                                        • Instruction ID: d491cf1c08f48956e4a283d68a62844e5389d84de4d4890e3e2f6dc2f5bd9609
                                        • Opcode Fuzzy Hash: aa712440c99e400ad3112f1de180d7fa4fd214528e926804a7b6df31602a9f11
                                        • Instruction Fuzzy Hash: 1F31203A3041248FCB10DFA8D8C4AAA73A4EB46264F01829EFC08D73A4DF35AC00C7D6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A737
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A74A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: ed906801043ca26262507471c9b174c409a873030392a605cc3baf7467579bdc
                                        • Instruction ID: 554080404f83d58f7aa34330aea9f577859c33c192eb4b9f595a86daed75e37c
                                        • Opcode Fuzzy Hash: ed906801043ca26262507471c9b174c409a873030392a605cc3baf7467579bdc
                                        • Instruction Fuzzy Hash: DC21DC773092218FC710DFA8E8C0A9AB3B4EB822A6705C56AE94097760DB35FC15C791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E67B
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E688
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E711
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E71E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 3f104df546123c4e60e698cd3906a162194a411dc96353d5c193e85f096a4305
                                        • Instruction ID: c5e7aa70f8c39d927a1745e7d459c013e1c4e9e30a2420cc49babdc80fbd35c2
                                        • Opcode Fuzzy Hash: 3f104df546123c4e60e698cd3906a162194a411dc96353d5c193e85f096a4305
                                        • Instruction Fuzzy Hash: 2E212836A042248BCB208F69DCC4B9A7394FB49365F41872AFC1997390DB38EC40C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 10479F8D
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 10479F9A
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047A02C
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047A039
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 51fda1320c1a626f0836fc700b87a17c9e86cbc850ae645a548d5e08c98d220e
                                        • Instruction ID: 56f835e3c3d207220b0f45a479841072762504db607bb0a0bf1718554cc79a12
                                        • Opcode Fuzzy Hash: 51fda1320c1a626f0836fc700b87a17c9e86cbc850ae645a548d5e08c98d220e
                                        • Instruction Fuzzy Hash: B321E1366051648FCB10CFA8D8C8A9A73A4EB863A5F05825EEC18973A5DB39BC11C7D5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E55B
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E568
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E5F1
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E5FE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 3f104df546123c4e60e698cd3906a162194a411dc96353d5c193e85f096a4305
                                        • Instruction ID: 9c73b168947f8ebe44f09ab4250b306ab9fccb73a3463212e55d094811d8480b
                                        • Opcode Fuzzy Hash: 3f104df546123c4e60e698cd3906a162194a411dc96353d5c193e85f096a4305
                                        • Instruction Fuzzy Hash: F921F7356042189BCB219FA9D8D4B967394EB49369F01871AFC1997390EB38AC40C7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E8BB
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E8CE
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E94A
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E957
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: caae8870396dd7038ebc4d604f8fa730eab077751d0c4c95ff28fa99ab750e6b
                                        • Instruction ID: 155539926ac79feffc2be0b4be7390359ae63d0c9355dd886bdbf9363914fa87
                                        • Opcode Fuzzy Hash: caae8870396dd7038ebc4d604f8fa730eab077751d0c4c95ff28fa99ab750e6b
                                        • Instruction Fuzzy Hash: 94212CB76041249BCB60DB69D8C0B9A7394EB4A3B5F05C35AED0897390DB38ED41C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E79B
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E7AE
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E82A
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E837
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: caae8870396dd7038ebc4d604f8fa730eab077751d0c4c95ff28fa99ab750e6b
                                        • Instruction ID: 436bcf1321fa6c678e3bc4c4a8b22431534ea9be6b2f82be60a83ce3358d9710
                                        • Opcode Fuzzy Hash: caae8870396dd7038ebc4d604f8fa730eab077751d0c4c95ff28fa99ab750e6b
                                        • Instruction Fuzzy Hash: DD21FC36A041248BCB20AF69D8D5B9A7394EB4A375F46C35AEC0897391DB38AC41C7D3
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E45D
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E470
                                        • EnterCriticalSection.KERNEL32(039F7CC8), ref: 1047E4F0
                                        • LeaveCriticalSection.KERNEL32(039F7CC8), ref: 1047E4FD
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: b05541ba58bd25aa1b6a6cb78b19275e84f15fc9cd921661f704788849efea7c
                                        • Instruction ID: 9bc50d6cf54b48f1cd08cce304b700ef407a0fcbb82ee27a10d9cbcea3a124c0
                                        • Opcode Fuzzy Hash: b05541ba58bd25aa1b6a6cb78b19275e84f15fc9cd921661f704788849efea7c
                                        • Instruction Fuzzy Hash: DA21C776A045249BCB209B7A9CC5B9A7394EB49364F05C35AFD1897390EB38EC01C7D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • HeapReAlloc.KERNEL32(00000000,?,?,00000000,032D898D,?,00000000,?,032D599D,00000000), ref: 032D8BED
                                        • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,032D898D,?,00000000,?,032D599D,00000000), ref: 032D8C21
                                        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,032D898D,?,00000000,?,032D599D,00000000), ref: 032D8C3B
                                        • HeapFree.KERNEL32(00000000,?,?,00000000,032D898D,?,00000000,?,032D599D,00000000), ref: 032D8C52
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: AllocHeap$FreeVirtual
                                        • String ID:
                                        • API String ID: 3499195154-0
                                        • Opcode ID: 05e0082b7125a4a4765e24edc241868d1497735a31b72c1c716ffa97b40e8734
                                        • Instruction ID: 131fd2c5f6c362402fac26e35909a679b3ee925314ed66a104c0d93d46b43d95
                                        • Opcode Fuzzy Hash: 05e0082b7125a4a4765e24edc241868d1497735a31b72c1c716ffa97b40e8734
                                        • Instruction Fuzzy Hash: B9113A30201651EFCB30EF19FC4A9A27BF6FB85722790891AE656CA5A4D374949ACB10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7C48), ref: 1047C47A
                                        • LeaveCriticalSection.KERNEL32(039F7C48), ref: 1047C48D
                                        • EnterCriticalSection.KERNEL32(039F7CE8), ref: 1047C496
                                        • LeaveCriticalSection.KERNEL32(039F7CE8), ref: 1047C4A3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 3e376371abd5166c7eea11dc8ddfed0900551a8de4638c928736ea527068d253
                                        • Instruction ID: 327bee19ab48b278ebda28e0e0964641a3d967da4f2b049909037cf311fcf26f
                                        • Opcode Fuzzy Hash: 3e376371abd5166c7eea11dc8ddfed0900551a8de4638c928736ea527068d253
                                        • Instruction Fuzzy Hash: 4B01DB3350562C5BC7115E5D9CE06AFB398FF85670F45811EEC18E33A0D368EC018B95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(039F7C48,?,?,?,?,1047C429,?), ref: 10488F33
                                        • LeaveCriticalSection.KERNEL32(039F7C48,?,?,?,?,1047C429,?), ref: 10488F46
                                        • EnterCriticalSection.KERNEL32(039F7CE8,?,?,?,?,1047C429,?), ref: 10488F4F
                                        • LeaveCriticalSection.KERNEL32(039F7CE8,?,?,?,?,1047C429,?), ref: 10488F5C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2890132170.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000001.00000002.2890095093.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.000000001048B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890437211.00000000106FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890614016.0000000010705000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890645204.0000000010708000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890676049.0000000010709000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890708810.0000000010717000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001071A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2890739006.000000001111A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891412730.00000000111AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891446185.00000000111AE000.00000008.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891495508.0000000011201000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891527910.0000000011212000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891559120.0000000011217000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011271000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.000000001128F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112C5000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.00000000112EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011331000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2891606679.0000000011352000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_10000000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: de28ffc10ccad9e4be3fbfa213a9ec03ba4bf5872cf02a39dcc77bc269116690
                                        • Instruction ID: 87737142d0fbecfaef5a83c1bc02259385bf1d52ca6b57228c09347ebb7afc88
                                        • Opcode Fuzzy Hash: de28ffc10ccad9e4be3fbfa213a9ec03ba4bf5872cf02a39dcc77bc269116690
                                        • Instruction Fuzzy Hash: 14F0D6726063295FA7005FEA6CC051BF399EE45561745452FEB14E3320E738EC008B95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InitializeCriticalSection.KERNEL32(?,032D990A,?,032D6189), ref: 032D73D3
                                        • InitializeCriticalSection.KERNEL32 ref: 032D73DB
                                        • InitializeCriticalSection.KERNEL32 ref: 032D73E3
                                        • InitializeCriticalSection.KERNEL32 ref: 032D73EB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2887468224.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                                        • Associated: 00000001.00000002.2887468224.00000000032E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        • Associated: 00000001.00000002.2887468224.00000000032EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_3290000_Cyber.jbxd
                                        Similarity
                                        • API ID: CriticalInitializeSection
                                        • String ID:
                                        • API String ID: 32694325-0
                                        • Opcode ID: d2b396a453d5ec4452960cdd056b561d7759646962ab484085b92e2fe1e91be6
                                        • Instruction ID: ab6f1a2ab544174c1c422d84239f4aa753b96b5e8a9d660f3b614bd4de280627
                                        • Opcode Fuzzy Hash: d2b396a453d5ec4452960cdd056b561d7759646962ab484085b92e2fe1e91be6
                                        • Instruction Fuzzy Hash: FBC00233C350349ACA113B65FC0D8463F25EF4626531DC062A5045503C8AB25CB2DFD4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:3.1%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:2
                                        Total number of Limit Nodes:0
                                        execution_graph 6651 44e4ba 6652 44e4c3 GetVersionExA 6651->6652

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                        • API String ID: 0-3917250287
                                        • Opcode ID: 4bcc5c706d1272e94f95cbfdc0bcd9066c37139970266445e02fd176bb9571ac
                                        • Instruction ID: 8ee7359c03843291578febc131cf6da320277be5cd150c745c6a92bda8319ec8
                                        • Opcode Fuzzy Hash: 4bcc5c706d1272e94f95cbfdc0bcd9066c37139970266445e02fd176bb9571ac
                                        • Instruction Fuzzy Hash: 434191F590025C79EB25E6E48C46FEFB6AC9B09744F4001B7BB04F61C2D67C9E448BA8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 53 4048a6-4048bf call 40118c call 401174 58 4048c4-4048c5 call 40114c 53->58 60 4048ca-4048d3 58->60 61 404988-40498f 60->61 62 4048d9-4048dd 60->62 63 4048e9-4048ff call 40119c 62->63 64 4048df-4048e3 62->64 67 404902-404905 63->67 64->61 64->63 68 404911-404919 67->68 69 404907-40490f 67->69 68->61 71 40491b-404920 68->71 69->68 70 404901 69->70 70->67 72 404922-40493c call 40118c call 40117c 71->72 73 40493e-404940 71->73 72->73 73->61 74 404942-404946 73->74 74->61 76 404948-40494d call 40118c 74->76 81 404952-40495d call 40117c 76->81 83 404962-404966 81->83 83->61 84 404968-404971 call 40118c 83->84 86 404976-404981 call 40117c 84->86 88 404986 86->88 88->61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: 244a34d743ee1956047c5136df9ee592a9f6b69cbd73a560dbec52d9bfa63f37
                                        • Instruction ID: c9c6129d32f584a08a610383b354ed68719691113bf190c796769d1b8a368ff2
                                        • Opcode Fuzzy Hash: 244a34d743ee1956047c5136df9ee592a9f6b69cbd73a560dbec52d9bfa63f37
                                        • Instruction Fuzzy Hash: 462160F5D0025D29EB35E6B88C46FDFB6AC4B09384F4401B7AB04F61D2D6788E448BA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 89 403264-40327b 90 403293-40329a 89->90 91 40327d-403280 89->91 92 4032e3-4032e7 90->92 93 40329c-4032a8 call 4031e0 90->93 91->90 94 403282-403291 91->94 96 4032f3-4032fc call 4030b4 92->96 97 4032e9-4032ec 92->97 103 4032c0-4032c7 93->103 104 4032aa-4032be call 405048 call 404fcb 93->104 94->90 105 403303-403308 96->105 106 4032fe-403301 96->106 97->96 100 4032ee-4032f0 97->100 100->96 108 4032c9-4032d7 call 40111c 103->108 109 4032dc-4032de 103->109 104->109 110 403320-403329 call 40308c 105->110 111 40330a-403318 call 404acc 105->111 106->105 106->110 108->109 109->92 121 40332b 110->121 122 40332e-403332 110->122 111->110 120 40331a-40331b call 401134 111->120 120->110 121->122 124 403334 call 403230 122->124 125 403339-40333c 122->125 124->125 127 403346-403355 125->127 128 40333e-403341 call 401114 125->128 127->92 128->127
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Runtime error at 00000000
                                        • API String ID: 0-1393363852
                                        • Opcode ID: 06d1f510ad044577468984ffb8653d9a507e3ec4b8d81ee312a7def9728a3627
                                        • Instruction ID: b8173a77a5bad1ae95b571b3a9d545ad3cb87312466f096001c29fe4b70ca49d
                                        • Opcode Fuzzy Hash: 06d1f510ad044577468984ffb8653d9a507e3ec4b8d81ee312a7def9728a3627
                                        • Instruction Fuzzy Hash: E321CE74A002009EEB34EF6684857567FD8AB45306F1884BFA944BB2C7C7BCDA85C76D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 130 4084c8-4084f6 call 405960 133 4084f8 130->133 134 4084fa-4084fd 130->134 133->134 135 408514-408516 call 4059e8 134->135 136 4084ff-408510 134->136 138 40851b-408534 call 4059e8 135->138 136->135 141 408576-40857d 138->141 142 408536-408540 call 405918 138->142 145 408567-40856a 142->145 145->141 146 40856c-408574 145->146 146->141 147 408542-40854c 146->147 148 408564 147->148 149 40854e-40854f 147->149 148->145 150 408552-408562 149->150 150->148 150->150
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d36c9ad529f5ff00f7c712c3257e7e841f0cd609311788d4c8ed63435e4d796b
                                        • Instruction ID: 4b6a789ebdc2bd176f093f7c5b6d8e7bcd99c7396301b240a3ce67e9e18b710c
                                        • Opcode Fuzzy Hash: d36c9ad529f5ff00f7c712c3257e7e841f0cd609311788d4c8ed63435e4d796b
                                        • Instruction Fuzzy Hash: 70113402644B919AC720BBB55D015ABBBD4CF62318F49847ED8E9776C2EA38D901932E
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 151 4019c0-4019cb 152 4019d1-4019e6 151->152 153 401a9d-401a9f 151->153 154 4019f2-401a11 call 401238 152->154 155 4019e8-4019ed call 401258 152->155 159 401a25-401a2b 154->159 155->154 160 401a13-401a1e call 401248 159->160 161 401a2d-401a52 call 4012c0 * 3 159->161 164 401a23 160->164 170 401a54-401a69 call 401238 161->170 171 401a6b-401a7f 161->171 164->159 170->171 175 401a81-401a86 call 401260 171->175 176 401a8b-401a95 call 401268 171->176 175->176
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 928f47f8ce43dc4670c31bee31c99d223876c5d01dddbca36ced1165bff2fdbe
                                        • Instruction ID: 4f71748dd93b4c8135f45c19847e48d3f1721c7c037694c7cb852acc65c2bd9d
                                        • Opcode Fuzzy Hash: 928f47f8ce43dc4670c31bee31c99d223876c5d01dddbca36ced1165bff2fdbe
                                        • Instruction Fuzzy Hash: 6C119D747042405AD731ABA99D81B1B3794A759708F9041BFF900F7AF2C67CA8888B2D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 180 4015a8-4015ec 181 40162a-401630 180->181 182 401632-401639 181->182 183 4015ee-4015f8 181->183 184 4015fa 183->184 185 4015fc-401600 183->185 184->185 186 401602 185->186 187 401606-401608 185->187 186->187 188 401628 187->188 189 40160a-401615 call 401240 187->189 188->181 191 40161a-40161c 189->191 191->188 192 40161e-401626 191->192 192->182
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cbaead09d6a5981287adf494f09ed7b05454a5203a1fd55f2f4bbcb3cfd9d975
                                        • Instruction ID: 973eabc71a431fb0b89221cb214eca5a63a481c1986ff9b06c5f9b86d821c4b2
                                        • Opcode Fuzzy Hash: cbaead09d6a5981287adf494f09ed7b05454a5203a1fd55f2f4bbcb3cfd9d975
                                        • Instruction Fuzzy Hash: EA11AC72A056019FC3109F29CC80A1BB7E5EBC4760F09C93EE598AB3A5E635AC408A49
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 193 401414-401421 194 401423-401428 193->194 195 40142a-401430 193->195 196 401436-401443 call 401240 194->196 195->196 198 401448-40144e 196->198 199 401450-40145e call 4012c8 198->199 200 401473-401476 198->200 199->200 203 401460-401471 call 401248 199->203 203->200
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aeb74b09a807319ff8b3dd674cd76027a937053602cd4c1cd00eed3db8fd1b4b
                                        • Instruction ID: 2e1672d6b05d08bbafa89bea8e66311dc2d0a34bf7ccc394fbc799d6d11a30d2
                                        • Opcode Fuzzy Hash: aeb74b09a807319ff8b3dd674cd76027a937053602cd4c1cd00eed3db8fd1b4b
                                        • Instruction Fuzzy Hash: 3FF0A772B0062017DB20696A5C81F5355C49F45B94F1581BBFE48FF3F9D6B54C0142ED
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 206 4030b4-4030c4 207 4030c6-4030dc 206->207 208 40310e-403112 206->208 209 4030f0-4030f8 207->209 210 4030de-4030e8 207->210 209->208 211 4030ea 210->211 212 4030ec-4030ee 210->212 213 4030ea call 408a82 211->213 214 4030ea call 4055d4 211->214 212->209 212->210 213->212 214->212
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d592683147a828d9f32c172ad6475afab4829e4eb4c87c64f814d01fcf8e05ca
                                        • Instruction ID: 7b0afac72c4539e31854512fb5d48fca0e7b207d17ea565b27ce5186b1ff571e
                                        • Opcode Fuzzy Hash: d592683147a828d9f32c172ad6475afab4829e4eb4c87c64f814d01fcf8e05ca
                                        • Instruction Fuzzy Hash: 6DF0BE31305A069EE3218F4B9981913FF9CFB88761364C43BE908D7A81CA79E9108968
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 215 4055d4-4055eb 216 405624-405631 215->216 217 4055ed-405601 call 404e74 * 2 call 4019c0 215->217 223 405606-40561f call 404150 * 3 217->223 223->216
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff55839efaebfb78defabf7ecdd1caf864ae9585cabe62fcd6fbc662081834ee
                                        • Instruction ID: e49ce88f8f04bfcedfde9c027bcace0f6dd6083d998d95bf7495aaac4cc71a12
                                        • Opcode Fuzzy Hash: ff55839efaebfb78defabf7ecdd1caf864ae9585cabe62fcd6fbc662081834ee
                                        • Instruction Fuzzy Hash: 8CE092B42445408EC7217BE668234173688D7A9714391883BFA08FAFD3CB3D5C09897D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 229 408a82-408aa6 call 402c10 call 408b00 call 402aa0 call 4058a8 237 408aab-408ab6 call 4058d0 229->237 240 408ab8-408aba call 402c00 237->240 241 408abf-408ac1 237->241 240->241
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6e0db532f14b7c669ee94952d530721998bf070dee4de7344432574ea44cc60b
                                        • Instruction ID: d43e99c534185534e8c2246644ac03042b38202926ef66e9536dfe29eb935c5b
                                        • Opcode Fuzzy Hash: 6e0db532f14b7c669ee94952d530721998bf070dee4de7344432574ea44cc60b
                                        • Instruction Fuzzy Hash: A3E08652300D1017D110B27D0E8654F13888E44218314453FB540E72C2EF3CDD060B9D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 243 4057f0-40580e call 405734 call 4047d4 247 405813-40581d 243->247 248 405829-40583a call 404abc 247->248 249 40581f-405824 247->249 249->248
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e1f174936159b30bef607abb00511943bf66f4d62f0ceb91916a96bda1e6e4d
                                        • Instruction ID: c54487bd5ef6b1886ef707e54dc280fd02bf5fc82bbe0b0199c8297bf02e4104
                                        • Opcode Fuzzy Hash: 0e1f174936159b30bef607abb00511943bf66f4d62f0ceb91916a96bda1e6e4d
                                        • Instruction Fuzzy Hash: 9FE086B56446059FC740EB9AEE8190732D89754310B00043BBA58E73D2E7BC99649B5F
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654686233.0000000000413000.00000040.00000001.01000000.00000008.sdmp, Offset: 00413000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_413000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1ae5ee0b7847a85fc060d668c91e39ffc59add5f8e7598af4ce23f40306a4ad9
                                        • Instruction ID: 73747ab4c403159c09452b58b7bb99affedd2aba8d382fadceb797a8ea54da72
                                        • Opcode Fuzzy Hash: 1ae5ee0b7847a85fc060d668c91e39ffc59add5f8e7598af4ce23f40306a4ad9
                                        • Instruction Fuzzy Hash: 69F0FCBAA052116BC601D919D6906DB7FD3ABC4B60F46491CF48813640C639F81ACF82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 252 4098b4-4098bd 253 4098c3-4098d2 call 405948 252->253 254 4099f8-4099fb 252->254 253->254 260 4098d8-4099f3 call 405950 * 16 253->260 256 409a06-409a09 254->256 257 4099fd-409a04 254->257 257->256 259 409a0a-409a0d 257->259 260->254
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                        • API String ID: 0-597814768
                                        • Opcode ID: cc44ef6fba07264e35a8a74204e93d72ea49b702e8ed37608d3f90d87460ec5d
                                        • Instruction ID: 32e3a3875a3605410609fb558c2e104f4610acd9f43f18ede30c37f298ca90a4
                                        • Opcode Fuzzy Hash: cc44ef6fba07264e35a8a74204e93d72ea49b702e8ed37608d3f90d87460ec5d
                                        • Instruction Fuzzy Hash: 963118B0600A10ABCB10AFB5999AB2737A8EB05310750097AB414FF2E6C67D9801CF5D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 293 4098ac-4098d2 294 4099f8-4099fb 293->294 295 4098d8-4099f3 call 405950 * 16 293->295 297 409a06-409a09 294->297 298 4099fd-409a04 294->298 295->294 298->297 300 409a0a-409a0d 298->300
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory
                                        • API String ID: 0-1196749652
                                        • Opcode ID: 8fa40aaf15466d2418815703261a8d0845035e9b98c31f4f84cf7211e3d99aa9
                                        • Instruction ID: 5d97f3932ed94d2c02ad184d0b95a25d39f434b363a44d15128239ad360056f2
                                        • Opcode Fuzzy Hash: 8fa40aaf15466d2418815703261a8d0845035e9b98c31f4f84cf7211e3d99aa9
                                        • Instruction Fuzzy Hash: DB311AB0A00A51AFCB10EFB59D99B273BA4EB053147500A7BB454EF2E6C67D9805CF8D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                        • API String ID: 0-2493093252
                                        • Opcode ID: 7475f800ed58d34c0f8d59580c8f0e853b1df3fbdabd4e812a55162696020ed9
                                        • Instruction ID: 665d9c3758f610642cc40926cd21eaff6adae2593d1eea0fddfd92a5d86eda01
                                        • Opcode Fuzzy Hash: 7475f800ed58d34c0f8d59580c8f0e853b1df3fbdabd4e812a55162696020ed9
                                        • Instruction Fuzzy Hash: 4A616F31B041489BD700FBA5DD8169E76AA9B88304F50E43FB901BB7C6CA3CD909976D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1654210290.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00401000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_401000_mbrmqqboi.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                        • API String ID: 0-665933166
                                        • Opcode ID: 688114005dde5bc401cd357312efdba7c5ecee71436ec0aeef0803e71398446f
                                        • Instruction ID: aaf271c7bf524b3c3120822437d12d8d60587f600a90f4dde97c621cf19cd574
                                        • Opcode Fuzzy Hash: 688114005dde5bc401cd357312efdba7c5ecee71436ec0aeef0803e71398446f
                                        • Instruction Fuzzy Hash: 1C616F31B041089BD700FBA5DD81A9E76AA9B88304F50E43FF901BB7C6CA3CD909976D
                                        Uniqueness

                                        Uniqueness Score: -1.00%