Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1445162
MD5:d9a7d15ae1511095bc12d4faa9be6f70
SHA1:b90fbb35eb6dd050e4829ecac702feab90f58859
SHA256:bdc61e24b03db5dbdeaf7979906ea51f0bfe388b41d8e7e80bde6d9acd716bba
Tags:exe
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 3872 cmdline: "C:\Users\user\Desktop\file.exe" MD5: D9A7D15AE1511095BC12D4FAA9BE6F70)
    • MSBuild.exe (PID: 6052 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • conhost.exe (PID: 5248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.2111135106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.2105387485.00000000046EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Process Memory Space: file.exe PID: 3872JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            SourceRuleDescriptionAuthorStrings
            0.2.file.exe.4746ff0.1.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              0.2.file.exe.4746ff0.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.file.exe.4746ff0.1.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
                • 0x44171:$s1: file:///
                • 0x440cd:$s2: {11111-22222-10009-11112}
                • 0x44101:$s3: {11111-22222-50001-00000}
                • 0x41283:$s4: get_Module
                • 0x3b664:$s5: Reverse
                • 0x3c348:$s6: BlockCopy
                • 0x3b62d:$s7: ReadByte
                • 0x44183:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
                0.2.file.exe.4746ff0.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                  0.2.file.exe.4746ff0.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    Click to see the 5 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeReversingLabs: Detection: 13%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15DE00 CryptGenRandom,__CxxThrowException@8,0_2_6E15DE00
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15DEE0 CryptReleaseContext,0_2_6E15DEE0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15DD20 CryptReleaseContext,0_2_6E15DD20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15DBB0 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8,0_2_6E15DBB0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15D9D0 CryptAcquireContextA,GetLastError,0_2_6E15D9D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15D7D5 CryptReleaseContext,0_2_6E15D7D5
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E15D7F0 CryptReleaseContext,0_2_6E15D7F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1835E0 CryptReleaseContext,0_2_6E1835E0
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\dev\sqlite\dotnet-private\obj\2015\System.Data.SQLite.Linq.2015\Release\System.Data.SQLite.Linq.pdb source: file.exe
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: file.exe, 00000000.00000002.2105387485.0000000004C6F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmp, file.exe, 00000000.00000002.2105387485.0000000004633000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115924406.0000000005E20000.00000004.08000000.00040000.00000000.sdmp, Protect544cd51a.dll.0.dr
                    Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdb source: file.exe
                    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdbfffGCTL source: file.exe
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: file.exe, 00000000.00000002.2105387485.0000000004BA1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115924406.0000000005EDA000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2105387485.0000000004D2C000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B83C28
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B83C22
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 05B8BF2Ah0_2_05B8BE78
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05B82928
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05B8291C
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B838F8
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B838F1
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_05B8C338
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B83B18
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B83B10
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_05B8C340
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 05B8BF2Ah0_2_05B8BA9A
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B83A08
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_05B83A00
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.18.38.233
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.18.38.233
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\]q equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\]q equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`,]q equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,]q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                    Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                    Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                    Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                    Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: file.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                    Source: file.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: file.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
                    Source: file.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                    Source: file.exeString found in binary or memory: http://ocsp.digicert.com0C
                    Source: file.exeString found in binary or memory: http://ocsp.digicert.com0H
                    Source: file.exeString found in binary or memory: http://ocsp.digicert.com0I
                    Source: file.exeString found in binary or memory: http://ocsp.digicert.com0O
                    Source: file.exeString found in binary or memory: http://ocsp.sectigo.com0
                    Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
                    Source: file.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                    Source: file.exeString found in binary or memory: https://aka.ms/dotnet-core-applaunch?The
                    Source: file.exeString found in binary or memory: https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%c
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002C09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                    Source: file.exeString found in binary or memory: https://sectigo.com/CPS0
                    Source: file.exeString found in binary or memory: https://system.data.sqlite.org/
                    Source: file.exeString found in binary or memory: https://www.digicert.com/CPS0
                    Source: file.exeString found in binary or memory: https://www.sqlite.org/lang_aggfunc.html
                    Source: file.exeString found in binary or memory: https://www.sqlite.org/lang_corefunc.html
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002DB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_ac11f1f2-f

                    System Summary

                    barindex
                    Source: 0.2.file.exe.4746ff0.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.file.exe.4746ff0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E12B6B00_2_6E12B6B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E154EE00_2_6E154EE0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E17AC290_2_6E17AC29
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E122D700_2_6E122D70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E144AC00_2_6E144AC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E108B300_2_6E108B30
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E170B890_2_6E170B89
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1449700_2_6E144970
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1066500_2_6E106650
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E10C7B00_2_6E10C7B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E10A7E00_2_6E10A7E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1445500_2_6E144550
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E17A54D0_2_6E17A54D
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1623100_2_6E162310
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1563B00_2_6E1563B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E11A0C00_2_6E11A0C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E143E500_2_6E143E50
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E155EB90_2_6E155EB9
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E17BFF10_2_6E17BFF1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E179FFC0_2_6E179FFC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E143C900_2_6E143C90
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E161CA00_2_6E161CA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E175DD20_2_6E175DD2
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E155DD00_2_6E155DD0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E179AAB0_2_6E179AAB
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1558300_2_6E155830
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1558D50_2_6E1558D5
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1558D70_2_6E1558D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E17B9640_2_6E17B964
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1434600_2_6E143460
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1552740_2_6E155274
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1432600_2_6E143260
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1550500_2_6E155050
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03468E400_2_03468E40
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03467DC80_2_03467DC8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0346BDA80_2_0346BDA8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_034616480_2_03461648
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03460E480_2_03460E48
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03460E580_2_03460E58
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_034616380_2_03461638
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_067026F80_2_067026F8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06700EB30_2_06700EB3
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_067026DC0_2_067026DC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_067009300_2_06700930
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00DA62E82_2_00DA62E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00DA60302_2_00DA6030
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00DA60202_2_00DA6020
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00DA62D92_2_00DA62D9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_02A9B33C2_2_02A9B33C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_02A9D3482_2_02A9D348
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_02A9D3432_2_02A9D343
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: SecurityJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 6E169B35 appears 141 times
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 6E1690D8 appears 51 times
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 6E16D520 appears 31 times
                    Source: file.exeStatic PE information: invalid certificate
                    Source: file.exe, 00000000.00000002.2120297143.0000000006361000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs file.exe
                    Source: file.exe, 00000000.00000002.2105387485.0000000004C6F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs file.exe
                    Source: file.exe, 00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Data.SQLite.Linq.dllF vs file.exe
                    Source: file.exe, 00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOutlook Primary Interop AssemblyL vs file.exe
                    Source: file.exe, 00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZipExtractor.dll: vs file.exe
                    Source: file.exe, 00000000.00000002.2105387485.00000000046EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSnorings.exe" vs file.exe
                    Source: file.exe, 00000000.00000002.2105387485.0000000004E14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSnorings.exe" vs file.exe
                    Source: file.exe, 00000000.00000002.2104966368.00000000035A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs file.exe
                    Source: file.exe, 00000000.00000002.2120334942.0000000006460000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs file.exe
                    Source: file.exe, 00000000.00000002.2115924406.0000000005FA8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs file.exe
                    Source: file.exe, 00000000.00000002.2105387485.0000000004DFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs file.exe
                    Source: file.exe, 00000000.00000000.1995460540.00000000011D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameportablefromdigitally_hub4.exeX6 vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilenameSystem.Data.SQLite.Linq.dllF vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilenameOutlook Primary Interop AssemblyL vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilenameZipExtractor.dll: vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilenameportablefromdigitally_hub4.exeX6 vs file.exe
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 0.2.file.exe.4746ff0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.file.exe.4746ff0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: *.sln
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBuild MyApp.csproj /t:Clean
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: /ignoreprojectextensions:.sln
                    Source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/3@0/0
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Protect544cd51a.dll
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5248:120:WilError_03
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to behavior
                    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeReversingLabs: Detection: 13%
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: file.exeStatic file information: File size 5154288 > 1048576
                    Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4aea00
                    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\dev\sqlite\dotnet-private\obj\2015\System.Data.SQLite.Linq.2015\Release\System.Data.SQLite.Linq.pdb source: file.exe
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: file.exe, 00000000.00000002.2105387485.0000000004C6F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmp, file.exe, 00000000.00000002.2105387485.0000000004633000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115924406.0000000005E20000.00000004.08000000.00040000.00000000.sdmp, Protect544cd51a.dll.0.dr
                    Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdb source: file.exe
                    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.2125522885.0000000003BB1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdbfffGCTL source: file.exe
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: file.exe, 00000000.00000002.2105387485.0000000004BA1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115924406.0000000005EDA000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2105387485.0000000004D2C000.00000004.00000800.00020000.00000000.sdmp
                    Source: file.exeStatic PE information: 0xA7BB0938 [Wed Mar 5 01:17:44 2059 UTC]
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E11B6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6E11B6C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E16CC2B push ecx; ret 0_2_6E16CC3E
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E16D565 push ecx; ret 0_2_6E16D578
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0346AD18 push eax; mov dword ptr [esp], ecx0_2_0346AD19
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03465428 push edi; ret 0_2_0346542F
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_05B8890F push dword ptr [esp+ecx*2-75h]; ret 0_2_05B88913
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00DA14A4 push cs; ret 2_2_00DA14A6
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3872, type: MEMORYSTR
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXEX
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\]Q
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 3460000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 35A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 55A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: DA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2BB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4BB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                    Source: C:\Users\user\Desktop\file.exe TID: 4128Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2124Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\]q
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exeX
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-57384
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E16948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E16948B
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E11B6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6E11B6C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E16948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E16948B
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E16B144 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6E16B144
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 456000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 48E000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: AB6008Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002DB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                    Source: MSBuild.exe, 00000002.00000002.2116927962.0000000002DB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E1684B0 cpuid 0_2_6E1684B0
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E16A25A GetSystemTimeAsFileTime,__aulldiv,0_2_6E16A25A
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.file.exe.d20000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2111135106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2105387485.00000000046EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.file.exe.d20000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2111135106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2105387485.00000000046EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4746ff0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6E11A0C0 CorBindToRuntimeEx,GetModuleHandleW,GetModuleHandleW,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6E11A0C0
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    312
                    Process Injection
                    1
                    Masquerading
                    11
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services11
                    Input Capture
                    22
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory111
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook312
                    Process Injection
                    NTDS31
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets23
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Timestomp
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe13%ReversingLabs
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    https://system.data.sqlite.org/0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
                    https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%c0%Avira URL Cloudsafe
                    https://api.ip.s0%Avira URL Cloudsafe
                    https://www.sqlite.org/lang_aggfunc.html0%Avira URL Cloudsafe
                    https://aka.ms/dotnet-core-applaunch?The0%Avira URL Cloudsafe
                    https://www.sqlite.org/lang_corefunc.html0%Avira URL Cloudsafe
                    https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tfile.exefalse
                      • URL Reputation: safe
                      unknown
                      https://api.ip.sb/ipMSBuild.exe, 00000002.00000002.2116927962.0000000002C09000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ip.sMSBuild.exe, 00000002.00000002.2116927962.0000000002C09000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0file.exefalse
                      • URL Reputation: safe
                      unknown
                      https://www.sqlite.org/lang_corefunc.htmlfile.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/dotnet-core-applaunch?Thefile.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.sectigo.com0file.exefalse
                      • URL Reputation: safe
                      unknown
                      https://system.data.sqlite.org/file.exefalse
                      • URL Reputation: safe
                      unknown
                      https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%cfile.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.sqlite.org/lang_aggfunc.htmlfile.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#file.exefalse
                      • URL Reputation: safe
                      unknown
                      https://discord.com/api/v9/users/MSBuild.exe, 00000002.00000002.2116927962.0000000002CB5000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1445162
                      Start date and time:2024-05-21 17:25:11 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 8s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:file.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@4/3@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 96%
                      • Number of executed functions: 236
                      • Number of non-executed functions: 208
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 2.19.104.72, 20.114.59.183, 93.184.221.240, 192.229.221.95, 13.85.23.206, 20.3.187.198, 2.16.100.168, 88.221.110.91
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: file.exe
                      No simulations
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      fp2e7a.wpc.phicdn.nethttps://weblaunch.blifax.com/listener3/redirect?l=e6df36b9-5af1-4758-b7e4-83fbf7f30dfb&id=e0d346f1-f241-ee11-acc4-000c295a2555&u=http%253Aeyesontheguys.com%2Fwinner%2F03013%2F%2FYnJhbmRvbi5nYXJjaWFAZ3RmY3Uub3JnGet hashmaliciousHTMLPhisherBrowse
                      • 192.229.221.95
                      https://app.hubspot.com/api/notification-station/general/v1/notifications/cta/0d34038d-a5a4-4a0d-a49c-130128d0eae5?notificationPortalId=44556035&deliveryMethod=EMAILGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      http://nervous-seed-snowplow.glitch.meGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://portal-uk.mailanyone.net/outer/passreset?token=dXNlcj1kb3VnLmpld2l0dEBpbmZpbml0eWdyb3VwLmNvLnVrO3RzPTE3MTYzMDExNTM7dG9rZW49%0ANThlOWIyOTNlNmZmMTU2ZTMyYjgwMDgyM2I3NzFmOWMzNWNiNGJlMg%3D%3DGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      http://www.highcpmgate.com/Get hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://pglt.me/e6Uqwa18IpGet hashmaliciousHTMLPhisherBrowse
                      • 192.229.221.95
                      https://msftexperience.qualtrics.com/jfe/form/SV_b1PzoUF1L5qlw1g?Q_DL=FqmbEi7ou0zrWMT_b1PzoUF1L5qlw1g_CGC_M5iNu9qrBGQePsZ&Q_CHL=emailGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      http://iyfhshsp.com/Stockyard.cfm?domain=ontariostockyards.on.ca&fp=CIJaHXP%2F0skOkNSQd%2F4jtYF3X0QXgT%2B41bUKlz9x8WIfofj6IPTV8ScBtVOQWLtb%2FRwG%2FSkHiiHeZllib976kXCJ4XMA794ZiznRS1wP5Uf04A9tPtI%2B0LoCkzGPdAHYsRq7MR7MdbFPY6oXhvApuHKBrlR32ugZAs8XzrJENmfc665HHXmTlZitcPeywgrTHI6o1222VmPYvgQj3BF3SrPGahD54P8mb7wnGA1Iq2VkMCzKYfTBs9TsEjTlKq4y0VG2Wfe4HZz%2FfV4Kj9e8srxlzEkIc8wqr0A4WlsXH8B6EYuy9GOPwGtl0mU5fDBh&yep=RVNTenhI%2BK5wtfh2y3hvr0C%2Bf8yLo0OquMvUcIDm2pI%2BazRSAc%2BgO8tqXXkadYdZm%2FCdVtUW6v4fRHfi2iLasg4ugBXXocFy%2BKZRh8tTJ%2B1hPAPyIid9TVDBqYtpHTyVkiaz87oq7ncPzsby9Tg3T2j1RIiGpW1BmK%2FTrWUih%2FXnDRKhZFMjpokW5c0YMS1fK3J7%2Bd66FySEOnk4uznr%2Bj2iXwlpK45ddD%2FQhCQdRbSYtXyK6Y%2BnNH0XmeriKJQq30PcKbP2b2rfFFjMfmciNCzMIuHsxuylX1DCXMJkN7S2Y8niXSmMcZHZ2gbvX7m%2FOujBxUYqP4pl5pesXzNvel9QWXdbhQ6U03mTXDA670%2FoRFLT8ez1b%2BRvdcfRh2IRVZ3USOJ7UUDZsD%2B4qi731tfoY%2BuT2tHsaGjnJUDy6MSUl743ntfchbV8KuCXmSn1XmeM0kBMR7GWGmgarnEPN%2Fu7tqup9nk129kApIU2XJazrgl2BHASztPoRHJA4xbNJbkTRaDBlHCK9N67TWzrLkFiJ4twAESoSeN26JeNJt6yqKEPdMZKK%2FsbdMW2QYCGWTu0y0eI792%2BqESxmSj4qA6XfdvJ79k%2Bt%2FyBpSzxK2dquDe2JW6MniZQO6CyU2DhiqKzuDQZmsRZ9m8oHVJf6beA8iYJEbjVJaqTWlmrxGQuQ3DSFeBBE8Ne7oPiiZpLqvFbXKPRcgHr9vMQnTDuCWeZqxXfyiW6CcQ3voM95JJ3tzh5utgMLxXBGHBXFS4Ixa%2B5xkoKj0z7EcOCMx8YiIPVZV4lNs46zB9oqP6jlu0MJAe0pYCGsL8uwTsCVWoXahV%2Fu8JKPadX1ikQgHDyF9%2BcBGvs%2FbzL7vuCdqOfmzHcvExkDQgErBb%2BBtNCNp%2B%2FWqR%2F0cmKe6xi8aBCM7qXGm9cEPpsSqr%2BUuXrF193vXut6QHyCd5IqK1XfStY9gWk7QIiMjNxV8zcI%2FXxHJzeFzAjtmoqhbv4cIOJbt8Na7zCDyqKk48L1UnuTJqozjuhQ8WSTcNUOw%2B88xJFzzj95RXpBCr2YLtw6JWH8LGB9MnYKzgGed%2B%2F2vh7SMj%2FO%2FGwwIYOzl3ObdsRSKRFiuUKJqDDT93kK1kj4kEZap5RR9jN6EErfJGTODOigOlaeC1li6Vkvd4gGLQ%2B0HboZ1yg1huBq3K6KvalppsbOoowIz7KG9DqWOJX8hCeGv9dgx9in43hGAWlPGAeuTIqH1boNtj9V3sYVooX5WKblP6tqk3kwvWKmKQOG8vtPGqF5k5Fu4FYO7VSCSzcZoMsDuO2NgJXtvtrFv2D%2FUL%2FeQWWBRqTbSAlLtN%2FMaxEHYMn8Gh%2FJUJ0BoFknnzE9rvJSVjZPOF9mWaZ5JUpoLmRcFBiOVduKCDx5GiDppZF7oI32XfhBbpQYJKIoXaSuCLE%2BUlgzBN8eV4RUkpSDfiZWEL0ePYtSC9bG1YPOZQrRvsZSXYnczNPInescpPN59yK9vXTcATqofw2juvQfGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      AFATS317052024.msiGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll3108_FreeDownloadFiles.zipGet hashmaliciousPureLog Stealer, VidarBrowse
                        file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                          dehdsDiT1p.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
                            SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exeGet hashmaliciousCryptOne, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, VidarBrowse
                              file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                40UAEu1Kpt.exeGet hashmaliciousLummaC, CryptOne, GCleaner, Glupteba, Mars Stealer, PrivateLoader, PureLog StealerBrowse
                                  file.exeGet hashmaliciousPrivateLoader, PureLog Stealer, Vidar, zgRATBrowse
                                    xY4kNfupZh.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                      yndoUKWawK.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1119
                                        Entropy (8bit):5.345080863654519
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                        MD5:88593431AEF401417595E7A00FE86E5F
                                        SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                        SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                        SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):522
                                        Entropy (8bit):5.358731107079437
                                        Encrypted:false
                                        SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLU84qpE4KlKDE4KhKiKhk
                                        MD5:93E4C46884CB6EE7CDCC4AACE78CDFAC
                                        SHA1:29B12D9409BA9AFE4C949F02F7D232233C0B5228
                                        SHA-256:2690023A62F22AB7B27B09351205BA31173B50B77ACA89A5759EDF29A1FB17F7
                                        SHA-512:E9C3E2FCEE4E13F7776665295A4F6085002913E011BEEF32C8E7065140937DDE1963182B547CC75110BF32AE5130A6686D5862076D5FFED9241F183B9217FA4D
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):760320
                                        Entropy (8bit):6.561572491684602
                                        Encrypted:false
                                        SSDEEP:12288:wCMz4nuvURpZ4jR1b2Ag+dQMWCD8iN2+OeO+OeNhBBhhBBgoo+A1AW8JwkaCZ+36:wCs4uvW4jfb2K90oo+C8JwUZc0
                                        MD5:544CD51A596619B78E9B54B70088307D
                                        SHA1:4769DDD2DBC1DC44B758964ED0BD231B85880B65
                                        SHA-256:DFCE2D4D06DE6452998B3C5B2DC33EAA6DB2BD37810D04E3D02DC931887CFDDD
                                        SHA-512:F56D8B81022BB132D40AA78596DA39B5C212D13B84B5C7D2C576BBF403924F1D22E750DE3B09D1BE30AEA359F1B72C5043B19685FC9BF06D8040BFEE16B17719
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Joe Sandbox View:
                                        • Filename: 3108_FreeDownloadFiles.zip, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: dehdsDiT1p.exe, Detection: malicious, Browse
                                        • Filename: SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: 40UAEu1Kpt.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: xY4kNfupZh.exe, Detection: malicious, Browse
                                        • Filename: yndoUKWawK.exe, Detection: malicious, Browse
                                        Reputation:moderate, very likely benign file
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......v...2...2...2...]...6....f..0...)=..,...)=....;...;...2.~.C...)=..i...)=......)=..3...)=..3...Rich2...........PE..L....#da...........!.....(...n...............@......................................(.....@.............................C.......x................................n...B..................................@............@...............................text....&.......(.................. ..`.rdata......@.......,..............@..@.data...`...........................@....rsrc...............................@..@.reloc..R...........................@..B........................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.171492010172408
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                        • Win32 Executable (generic) a (10002005/4) 49.97%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:file.exe
                                        File size:5'154'288 bytes
                                        MD5:d9a7d15ae1511095bc12d4faa9be6f70
                                        SHA1:b90fbb35eb6dd050e4829ecac702feab90f58859
                                        SHA256:bdc61e24b03db5dbdeaf7979906ea51f0bfe388b41d8e7e80bde6d9acd716bba
                                        SHA512:f913e5bbb998ad8a391ea99c6d045081da5af128b9391c3a0249ec4eeb9a504be796b3315e7c5b4bae825b7629527719a845a974f4eba37bd0233b86e5483e25
                                        SSDEEP:98304:NllmCKfheKnF4Gnuyjscn9GtGOqHLixnkmb0ZKH4lODcxSgo5Gn8WuMRIn+N3gNX:NllmCKfY2uWUMBHLi6mb0ZKH4lODcxSL
                                        TLSH:EF36AE01736A9521C54D9372E2E21E1443F29E47AA66DF0A3B9D37540F633CF8D4B3AA
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.................P...J..L........K.. ... K...@.. ........................N......GO...@................................
                                        Icon Hash:13e3e3e3c381d083
                                        Entrypoint:0x8b089e
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0xA7BB0938 [Wed Mar 5 01:17:44 2059 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Signature Valid:false
                                        Signature Issuer:CN=\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg
                                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                        Error Number:-2146762487
                                        Not Before, Not After
                                        • 20/05/2024 13:47:06 21/05/2034 13:47:06
                                        Subject Chain
                                        • CN=\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg\u2014s\xb9f\xd3Ee\xde\xd2\xf7\xdcFZW?_g\xbfg
                                        Version:3
                                        Thumbprint MD5:9765BC66A4BCC62EAC5E424030500246
                                        Thumbprint SHA-1:E9832723AACF3BAB6D745EBE2786D8FE9CFDCF06
                                        Thumbprint SHA-256:0385CC496A59393A5240639BFB0F67CAAD89ED2EF622041872AFD82A77C270B5
                                        Serial:66A1FE15A80605A545E3CAA1D775F619
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x4b08500x4b.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4b20000x34914.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x4e38000x6df0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e80000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x4ae8a40x4aea00b2c8be8013f91555e85d43f0f0cbf2d8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x4b20000x349140x34a002535f3a8a2fb496ded4ea2b1da5ac112False0.4859801811163896data5.601237882346497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x4e80000xc0x200083f989b23a1e9120b26a385b411a6cbFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        EDPPERMISSIVEAPPINFOID0x4b23b40x2data5.0
                                        MUI0x4b23b80x158data0.5581395348837209
                                        RT_ICON0x4b25100x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.651595744680851
                                        RT_ICON0x4b29780x988Device independent bitmap graphic, 24 x 48 x 32, image size 23040.5192622950819672
                                        RT_ICON0x4b33000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.45426829268292684
                                        RT_ICON0x4b43a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.4049792531120332
                                        RT_ICON0x4b69500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.3597071327350024
                                        RT_ICON0x4bab780x5488Device independent bitmap graphic, 72 x 144 x 32, image size 207360.34560998151571165
                                        RT_ICON0x4c00000x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 368640.3220779903300399
                                        RT_ICON0x4c94a80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.2969359990535904
                                        RT_ICON0x4d9cd00xc008PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9982302685109845
                                        RT_GROUP_ICON0x4e5cd80x84data0.7272727272727273
                                        RT_VERSION0x4e5d5c0x3ecdata0.3615537848605578
                                        RT_MANIFEST0x4e61480x7c9XML 1.0 document, ASCII text, with CRLF line terminators0.3622679377822378
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSource PortDest PortSource IPDest IP
                                        May 21, 2024 17:25:56.827824116 CEST49675443192.168.2.523.1.237.91
                                        May 21, 2024 17:25:56.827893972 CEST49674443192.168.2.523.1.237.91
                                        May 21, 2024 17:25:56.937187910 CEST49673443192.168.2.523.1.237.91
                                        May 21, 2024 17:26:06.437202930 CEST49674443192.168.2.523.1.237.91
                                        May 21, 2024 17:26:06.437247038 CEST49675443192.168.2.523.1.237.91
                                        May 21, 2024 17:26:06.546533108 CEST49673443192.168.2.523.1.237.91
                                        May 21, 2024 17:26:08.266313076 CEST4434970523.1.237.91192.168.2.5
                                        May 21, 2024 17:26:08.266573906 CEST49705443192.168.2.523.1.237.91
                                        May 21, 2024 17:26:44.374826908 CEST4970480192.168.2.5104.18.38.233
                                        May 21, 2024 17:26:44.374876976 CEST4970380192.168.2.5172.64.149.23
                                        May 21, 2024 17:26:44.380251884 CEST8049704104.18.38.233192.168.2.5
                                        May 21, 2024 17:26:44.380335093 CEST4970480192.168.2.5104.18.38.233
                                        May 21, 2024 17:26:44.386543036 CEST8049703172.64.149.23192.168.2.5
                                        May 21, 2024 17:26:44.386604071 CEST4970380192.168.2.5172.64.149.23
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        May 21, 2024 17:26:18.257323980 CEST1.1.1.1192.168.2.50x5720No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        May 21, 2024 17:26:18.257323980 CEST1.1.1.1192.168.2.50x5720No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                        May 21, 2024 17:26:32.507153034 CEST1.1.1.1192.168.2.50x35b1No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        May 21, 2024 17:26:32.507153034 CEST1.1.1.1192.168.2.50x35b1No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:11:25:58
                                        Start date:21/05/2024
                                        Path:C:\Users\user\Desktop\file.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                        Imagebase:0xd20000
                                        File size:5'154'288 bytes
                                        MD5 hash:D9A7D15AE1511095BC12D4FAA9BE6F70
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2105387485.00000000046EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1994966635.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:11:26:08
                                        Start date:21/05/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                        Imagebase:0x850000
                                        File size:262'432 bytes
                                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.2111135106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:3
                                        Start time:11:26:08
                                        Start date:21/05/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:5.4%
                                          Dynamic/Decrypted Code Coverage:2.7%
                                          Signature Coverage:7.2%
                                          Total number of Nodes:1243
                                          Total number of Limit Nodes:54
                                          execution_graph 58320 6e116bc0 58321 6e116bde 58320->58321 58322 6e116c26 58321->58322 58330 6e169d21 58321->58330 58324 6e116bf7 58325 6e116c1d 58324->58325 58334 6e115300 58324->58334 58329 6e116c3c 58331 6e16e8d5 __EH_prolog3_catch 58330->58331 58332 6e169bb5 77 API calls 58331->58332 58333 6e16e8ed _Fac_tidy 58332->58333 58333->58324 58335 6e115322 58334->58335 58336 6e115329 58335->58336 58342 6e115840 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 58335->58342 58336->58325 58338 6e116c60 SafeArrayCreateVector SafeArrayAccessData 58336->58338 58339 6e116c91 _memmove 58338->58339 58340 6e116cad 58338->58340 58341 6e116c9f SafeArrayUnaccessData 58339->58341 58340->58329 58341->58340 58342->58336 57255 6e132ed0 57256 6e132f09 57255->57256 57276 6e133006 moneypunct 57255->57276 57277 6e169bb5 57256->57277 57259 6e169bb5 77 API calls 57260 6e132f54 57259->57260 57289 6e115050 57260->57289 57262 6e132f6e 57263 6e169bb5 77 API calls 57262->57263 57264 6e132f75 57263->57264 57265 6e115050 77 API calls 57264->57265 57266 6e132f8f 57265->57266 57267 6e169bb5 77 API calls 57266->57267 57268 6e132f96 57267->57268 57269 6e115050 77 API calls 57268->57269 57270 6e132fb0 57269->57270 57271 6e169bb5 77 API calls 57270->57271 57272 6e132fb7 57271->57272 57273 6e115050 77 API calls 57272->57273 57274 6e132fd1 57273->57274 57297 6e1116b0 57274->57297 57279 6e169bbf 57277->57279 57280 6e132f31 57279->57280 57284 6e169bdb std::exception::exception 57279->57284 57361 6e169d66 57279->57361 57378 6e16c86e DecodePointer 57279->57378 57280->57259 57282 6e169c19 57380 6e1695c1 66 API calls std::exception::operator= 57282->57380 57284->57282 57379 6e169af4 76 API calls __cinit 57284->57379 57285 6e169c23 57381 6e16ac75 RaiseException 57285->57381 57288 6e169c34 57290 6e11505d 57289->57290 57291 6e115091 57289->57291 57290->57291 57293 6e115066 57290->57293 57292 6e11509d 57291->57292 57391 6e115110 77 API calls std::_Xinvalid_argument 57291->57391 57292->57262 57294 6e11507a 57293->57294 57390 6e115110 77 API calls std::_Xinvalid_argument 57293->57390 57294->57262 57298 6e169bb5 77 API calls 57297->57298 57299 6e111706 57298->57299 57300 6e111711 57299->57300 57301 6e111c39 57299->57301 57392 6e112d70 57300->57392 57444 6e169533 66 API calls std::exception::_Copy_str 57301->57444 57304 6e111c48 57445 6e16ac75 RaiseException 57304->57445 57307 6e112d70 77 API calls 57309 6e111788 57307->57309 57308 6e111c5d 57310 6e112d70 77 API calls 57309->57310 57311 6e1117a9 57310->57311 57312 6e112d70 77 API calls 57311->57312 57313 6e1117ca 57312->57313 57314 6e112d70 77 API calls 57313->57314 57315 6e1117e6 57314->57315 57316 6e112d70 77 API calls 57315->57316 57317 6e11182f 57316->57317 57318 6e112d70 77 API calls 57317->57318 57319 6e111878 57318->57319 57320 6e112d70 77 API calls 57319->57320 57321 6e1118c6 57320->57321 57322 6e112d70 77 API calls 57321->57322 57323 6e1118e7 57322->57323 57324 6e112d70 77 API calls 57323->57324 57325 6e111900 57324->57325 57326 6e112d70 77 API calls 57325->57326 57327 6e111946 57326->57327 57328 6e112d70 77 API calls 57327->57328 57329 6e11198f 57328->57329 57330 6e112d70 77 API calls 57329->57330 57331 6e1119d3 57330->57331 57332 6e112d70 77 API calls 57331->57332 57333 6e111a05 57332->57333 57400 6e113b30 57333->57400 57336 6e112d70 77 API calls 57337 6e111a21 57336->57337 57338 6e112d70 77 API calls 57337->57338 57339 6e111a82 57338->57339 57409 6e113bd0 57339->57409 57342 6e112d70 77 API calls 57343 6e111a9e 57342->57343 57344 6e112d70 77 API calls 57343->57344 57345 6e111aec 57344->57345 57418 6e112a80 57345->57418 57347 6e111b4c 57348 6e111b62 57347->57348 57441 6e16919e 67 API calls 3 library calls 57347->57441 57424 6e1169e0 57348->57424 57428 6e1330c0 57348->57428 57432 6e116850 57348->57432 57436 6e1342e0 57348->57436 57349 6e111b58 57442 6e169125 67 API calls 2 library calls 57349->57442 57353 6e111b00 57353->57347 57353->57349 57355 6e111b6d moneypunct 57353->57355 57440 6e112e60 77 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 57353->57440 57443 6e113530 67 API calls 57355->57443 57356 6e111ba1 moneypunct 57356->57276 57362 6e169de3 57361->57362 57366 6e169d74 57361->57366 57388 6e16c86e DecodePointer 57362->57388 57364 6e169de9 57389 6e16d7d8 66 API calls __getptd_noexit 57364->57389 57365 6e169d7f 57365->57366 57382 6e16d74e 66 API calls __NMSG_WRITE 57365->57382 57383 6e16d59f 66 API calls 6 library calls 57365->57383 57384 6e16d279 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 57365->57384 57366->57365 57369 6e169da2 RtlAllocateHeap 57366->57369 57372 6e169dcf 57366->57372 57376 6e169dcd 57366->57376 57385 6e16c86e DecodePointer 57366->57385 57369->57366 57370 6e169ddb 57369->57370 57370->57279 57386 6e16d7d8 66 API calls __getptd_noexit 57372->57386 57387 6e16d7d8 66 API calls __getptd_noexit 57376->57387 57378->57279 57379->57282 57380->57285 57381->57288 57382->57365 57383->57365 57385->57366 57386->57376 57387->57370 57388->57364 57389->57370 57390->57294 57391->57292 57393 6e112db8 57392->57393 57399 6e112e0d 57393->57399 57454 6e105a30 77 API calls 2 library calls 57393->57454 57395 6e112e02 57455 6e113cc0 67 API calls 57395->57455 57398 6e111746 57398->57307 57446 6e16948b 57399->57446 57401 6e113b3d 57400->57401 57402 6e169bb5 77 API calls 57401->57402 57403 6e113b6f 57402->57403 57404 6e111a0c 57403->57404 57457 6e169533 66 API calls std::exception::_Copy_str 57403->57457 57404->57336 57406 6e113bae 57458 6e16ac75 RaiseException 57406->57458 57408 6e113bc3 57410 6e113bdd 57409->57410 57411 6e169bb5 77 API calls 57410->57411 57412 6e113c0f 57411->57412 57413 6e111a89 57412->57413 57459 6e169533 66 API calls std::exception::_Copy_str 57412->57459 57413->57342 57415 6e113c4e 57460 6e16ac75 RaiseException 57415->57460 57417 6e113c63 57419 6e112acd 57418->57419 57420 6e112ae6 57418->57420 57421 6e112adf 57419->57421 57461 6e1690d8 67 API calls 2 library calls 57419->57461 57420->57353 57462 6e1131e0 77 API calls 2 library calls 57421->57462 57425 6e116a1f 57424->57425 57426 6e1169fe 57424->57426 57425->57355 57463 6e119110 57426->57463 57429 6e1330de 57428->57429 57431 6e1330f8 57428->57431 57589 6e115fa0 57429->57589 57431->57355 57433 6e11686e 57432->57433 57435 6e116890 57432->57435 57610 6e118bc0 57433->57610 57435->57355 57437 6e13431d 57436->57437 57438 6e1342fe 57436->57438 57437->57355 58014 6e1162c0 57438->58014 57440->57353 57441->57349 57442->57348 57443->57356 57444->57304 57445->57308 57447 6e169495 IsDebuggerPresent 57446->57447 57448 6e169493 57446->57448 57456 6e170036 57447->57456 57448->57398 57451 6e16ce7e SetUnhandledExceptionFilter UnhandledExceptionFilter 57452 6e16cea3 GetCurrentProcess TerminateProcess 57451->57452 57453 6e16ce9b __call_reportfault 57451->57453 57452->57398 57453->57452 57454->57395 57455->57399 57456->57451 57457->57406 57458->57408 57459->57415 57460->57417 57461->57421 57462->57420 57464 6e119121 57463->57464 57465 6e11912c EnterCriticalSection 57463->57465 57464->57425 57466 6e119150 57465->57466 57467 6e11915b LeaveCriticalSection 57466->57467 57468 6e11923f 57467->57468 57469 6e11916a EnterCriticalSection 57467->57469 57468->57425 57470 6e119185 57469->57470 57471 6e119190 LeaveCriticalSection 57470->57471 57471->57468 57472 6e1191a1 57471->57472 57479 6e126b10 57472->57479 57483 6e126b64 57479->57483 57480 6e126f19 InterlockedCompareExchange 57482 6e1191f3 57480->57482 57482->57468 57550 6e119840 57482->57550 57483->57480 57565 6e132e20 57483->57565 57485 6e126f12 SafeArrayDestroy 57485->57480 57486 6e126bc2 57486->57480 57549 6e126edd 57486->57549 57569 6e1328c0 InterlockedCompareExchange 57486->57569 57488 6e126c6b 57488->57480 57489 6e126c7e SafeArrayGetLBound 57488->57489 57488->57549 57490 6e126c99 SafeArrayGetUBound 57489->57490 57489->57549 57491 6e126cb4 SafeArrayAccessData 57490->57491 57490->57549 57492 6e126cd5 57491->57492 57491->57549 57570 6e125760 67 API calls std::tr1::_Xweak 57492->57570 57494 6e126cf5 SafeArrayUnaccessData 57495 6e126d07 57494->57495 57494->57549 57495->57549 57571 6e111690 77 API calls 57495->57571 57497 6e126d2c 57498 6e169bb5 77 API calls 57497->57498 57499 6e126d3f 57498->57499 57500 6e115050 77 API calls 57499->57500 57501 6e126d59 57500->57501 57502 6e169bb5 77 API calls 57501->57502 57503 6e126d63 57502->57503 57504 6e115050 77 API calls 57503->57504 57505 6e126d7f 57504->57505 57506 6e169bb5 77 API calls 57505->57506 57507 6e126d86 57506->57507 57508 6e115050 77 API calls 57507->57508 57509 6e126da0 57508->57509 57572 6e1150c0 77 API calls 57509->57572 57511 6e126dab 57512 6e169bb5 77 API calls 57511->57512 57513 6e126db2 57512->57513 57514 6e115050 77 API calls 57513->57514 57515 6e126dcf 57514->57515 57573 6e1150c0 77 API calls 57515->57573 57517 6e126dda 57518 6e169bb5 77 API calls 57517->57518 57519 6e126de7 57518->57519 57520 6e115050 77 API calls 57519->57520 57521 6e126e01 57520->57521 57574 6e1150c0 77 API calls 57521->57574 57523 6e126e0c 57524 6e169bb5 77 API calls 57523->57524 57525 6e126e19 57524->57525 57526 6e115050 77 API calls 57525->57526 57527 6e126e33 57526->57527 57528 6e169bb5 77 API calls 57527->57528 57529 6e126e3a 57528->57529 57530 6e115050 77 API calls 57529->57530 57531 6e126e58 57530->57531 57532 6e169bb5 77 API calls 57531->57532 57533 6e126e5f 57532->57533 57534 6e115050 77 API calls 57533->57534 57535 6e126e79 57534->57535 57575 6e1150c0 77 API calls 57535->57575 57537 6e126e84 57576 6e1150c0 77 API calls 57537->57576 57539 6e126e8f 57540 6e169bb5 77 API calls 57539->57540 57541 6e126e9b 57540->57541 57542 6e115050 77 API calls 57541->57542 57543 6e126eb5 57542->57543 57577 6e1150c0 77 API calls 57543->57577 57545 6e126ec0 57578 6e1150c0 77 API calls 57545->57578 57547 6e126ecb 57579 6e112a40 327 API calls 57547->57579 57549->57480 57549->57485 57551 6e169bb5 77 API calls 57550->57551 57552 6e119865 57551->57552 57553 6e119227 57552->57553 57580 6e169533 66 API calls std::exception::_Copy_str 57552->57580 57558 6e117140 57553->57558 57555 6e1198ab 57581 6e16ac75 RaiseException 57555->57581 57557 6e1198c0 57582 6e132820 57558->57582 57560 6e1171f8 57560->57425 57561 6e11719c 57564 6e1171d7 57561->57564 57587 6e16919e 67 API calls 3 library calls 57561->57587 57564->57560 57588 6e169d2c 66 API calls 2 library calls 57564->57588 57566 6e132e67 57565->57566 57567 6e132e7b 57565->57567 57566->57567 57568 6e132e9f InterlockedCompareExchange 57566->57568 57567->57486 57568->57486 57569->57488 57570->57494 57571->57497 57572->57511 57573->57517 57574->57523 57575->57537 57576->57539 57577->57545 57578->57547 57579->57549 57580->57555 57581->57557 57583 6e132845 57582->57583 57584 6e1328af 57583->57584 57585 6e169d66 _malloc 66 API calls 57583->57585 57584->57561 57586 6e132876 57585->57586 57586->57561 57587->57564 57588->57560 57590 6e169bb5 77 API calls 57589->57590 57591 6e116003 57590->57591 57592 6e169bb5 77 API calls 57591->57592 57593 6e116028 57592->57593 57594 6e115050 77 API calls 57593->57594 57595 6e116042 57594->57595 57596 6e169bb5 77 API calls 57595->57596 57597 6e116049 57596->57597 57598 6e115050 77 API calls 57597->57598 57599 6e116067 57598->57599 57600 6e169bb5 77 API calls 57599->57600 57601 6e11606e 57600->57601 57602 6e115050 77 API calls 57601->57602 57603 6e11608b 57602->57603 57604 6e169bb5 77 API calls 57603->57604 57605 6e116092 57604->57605 57606 6e115050 77 API calls 57605->57606 57607 6e1160ac 57606->57607 57608 6e1116b0 327 API calls 57607->57608 57609 6e1160de moneypunct 57608->57609 57609->57431 57611 6e118bd5 EnterCriticalSection 57610->57611 57612 6e118bcc 57610->57612 57620 6e12e030 57611->57620 57612->57435 57616 6e118c13 LeaveCriticalSection 57616->57435 57621 6e12e090 57620->57621 57622 6e12e05d 57620->57622 57623 6e169bb5 77 API calls 57621->57623 57624 6e169bb5 77 API calls 57622->57624 57625 6e118bec 57622->57625 57623->57625 57624->57625 57626 6e11b6c0 GetModuleHandleW 57625->57626 57627 6e11b717 LoadLibraryW 57626->57627 57628 6e11b72a GetProcAddress 57626->57628 57627->57628 57629 6e11b94c 57627->57629 57628->57629 57632 6e11b73e 57628->57632 57630 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57629->57630 57631 6e118bfa 57630->57631 57631->57616 57639 6e118c40 57631->57639 57632->57629 57633 6e11b85d 57632->57633 57653 6e16a116 80 API calls __mbstowcs_s_l 57633->57653 57635 6e11b875 GetModuleHandleW 57635->57629 57636 6e11b8aa GetProcAddress 57635->57636 57636->57629 57638 6e11b8f2 57636->57638 57638->57629 57654 6e11a350 VariantInit VariantInit VariantInit 57639->57654 57640 6e118c63 57641 6e118cf9 57640->57641 57664 6e118b10 EnterCriticalSection 57640->57664 57641->57616 57643 6e118c83 57644 6e118ce2 57643->57644 57645 6e118c9f 57643->57645 57673 6e11b9a0 57643->57673 57644->57616 57681 6e11bab0 57645->57681 57648 6e118cd3 57648->57644 57697 6e118ff0 69 API calls std::tr1::_Xweak 57648->57697 57653->57635 57658 6e11a3b5 57654->57658 57655 6e11a505 VariantClear VariantClear VariantClear 57656 6e11a52a 57655->57656 57656->57640 57657 6e11a3e0 VariantCopy 57659 6e11a3f9 57657->57659 57660 6e11a3ff VariantClear 57657->57660 57658->57655 57658->57657 57659->57660 57661 6e11a413 57660->57661 57661->57655 57662 6e11a549 VariantClear VariantClear VariantClear 57661->57662 57663 6e11a57a 57662->57663 57663->57640 57665 6e118b4b 57664->57665 57667 6e169bb5 77 API calls 57665->57667 57672 6e118b53 LeaveCriticalSection 57665->57672 57668 6e118b64 57667->57668 57669 6e118b80 57668->57669 57698 6e117370 79 API calls 2 library calls 57668->57698 57699 6e1196d0 77 API calls 57669->57699 57672->57643 57674 6e11b9dc 57673->57674 57675 6e11ba7a 57674->57675 57676 6e169bb5 77 API calls 57674->57676 57675->57645 57677 6e11ba3a 57676->57677 57678 6e11ba6a 57677->57678 57744 6e125f00 77 API calls 2 library calls 57677->57744 57700 6e126fd0 57678->57700 57761 6e12b580 57681->57761 57683 6e11baf3 57687 6e118cbd 57683->57687 57766 6e11af30 VariantInit VariantInit VariantInit 57683->57766 57685 6e11bb0d 57686 6e169bb5 77 API calls 57685->57686 57685->57687 57686->57687 57687->57644 57688 6e118d60 EnterCriticalSection 57687->57688 57787 6e119750 57688->57787 57691 6e118e0a 57691->57648 57692 6e118d97 57692->57691 57693 6e118de5 57692->57693 57789 6e11bdf7 57692->57789 57799 6e118e20 57693->57799 57695 6e118e02 57695->57648 57697->57644 57698->57669 57699->57672 57701 6e12700a 57700->57701 57743 6e1278c2 57700->57743 57701->57743 57745 6e11d920 57701->57745 57702 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57703 6e128326 57702->57703 57703->57675 57705 6e1278b5 57706 6e11d920 3 API calls 57705->57706 57705->57743 57707 6e127920 57706->57707 57708 6e11d920 3 API calls 57707->57708 57707->57743 57709 6e127986 57708->57709 57710 6e11d920 3 API calls 57709->57710 57711 6e1279df 57709->57711 57710->57711 57711->57743 57753 6e11d9f0 57711->57753 57713 6e127a7b 57714 6e11d9f0 3 API calls 57713->57714 57713->57743 57715 6e127acb 57714->57715 57716 6e11d9f0 3 API calls 57715->57716 57715->57743 57717 6e127b19 57716->57717 57718 6e11d9f0 3 API calls 57717->57718 57717->57743 57719 6e127b90 57718->57719 57720 6e11d9f0 3 API calls 57719->57720 57719->57743 57721 6e127c0b 57720->57721 57722 6e11d9f0 3 API calls 57721->57722 57721->57743 57723 6e127ca5 57722->57723 57724 6e11d9f0 3 API calls 57723->57724 57723->57743 57725 6e127d3f 57724->57725 57726 6e11d9f0 3 API calls 57725->57726 57725->57743 57727 6e127dbb 57726->57727 57728 6e11d9f0 3 API calls 57727->57728 57727->57743 57729 6e127e44 57728->57729 57730 6e11d9f0 3 API calls 57729->57730 57729->57743 57731 6e127eb5 57730->57731 57732 6e11d9f0 3 API calls 57731->57732 57731->57743 57733 6e127f6e 57732->57733 57734 6e11d9f0 3 API calls 57733->57734 57733->57743 57735 6e128081 57734->57735 57736 6e11d9f0 3 API calls 57735->57736 57735->57743 57737 6e1280ca 57736->57737 57738 6e11d9f0 3 API calls 57737->57738 57737->57743 57739 6e1280f9 57738->57739 57740 6e11d9f0 3 API calls 57739->57740 57739->57743 57741 6e128175 57740->57741 57742 6e11d9f0 3 API calls 57741->57742 57741->57743 57742->57743 57743->57702 57744->57678 57746 6e11d944 SafeArrayCreateVector 57745->57746 57747 6e11d936 57745->57747 57748 6e11d95a 57746->57748 57750 6e11d981 57746->57750 57747->57746 57749 6e11d960 SafeArrayPutElement 57748->57749 57748->57750 57749->57748 57749->57750 57751 6e11d9d5 57750->57751 57752 6e11d9ce SafeArrayDestroy 57750->57752 57751->57705 57752->57751 57754 6e11da11 SafeArrayCreateVector 57753->57754 57755 6e11da03 57753->57755 57756 6e11da27 SafeArrayPutElement 57754->57756 57760 6e11da48 57754->57760 57755->57754 57757 6e11da3d 57756->57757 57756->57760 57757->57756 57757->57760 57758 6e11daa4 57758->57713 57759 6e11da9d SafeArrayDestroy 57759->57758 57760->57758 57760->57759 57762 6e12b5b5 57761->57762 57763 6e12b5cb VariantInit VariantInit 57761->57763 57762->57683 57765 6e12b5ee 57763->57765 57764 6e12b675 VariantClear VariantClear 57764->57683 57765->57764 57769 6e11af97 57766->57769 57767 6e11b22c VariantClear VariantClear VariantClear 57768 6e11b254 57767->57768 57768->57685 57769->57767 57770 6e11affe VariantCopy 57769->57770 57771 6e11b017 57770->57771 57772 6e11b01d VariantClear 57770->57772 57771->57772 57773 6e11b035 57772->57773 57773->57767 57774 6e169bb5 77 API calls 57773->57774 57775 6e11b0ae 57774->57775 57786 6e16a136 66 API calls __commit 57775->57786 57777 6e11b108 57778 6e11b190 SafeArrayGetLBound SafeArrayGetUBound 57777->57778 57779 6e11b28d VariantClear VariantClear VariantClear 57777->57779 57783 6e11b1fd moneypunct 57777->57783 57780 6e11b28b 57778->57780 57781 6e11b1bf SafeArrayAccessData 57778->57781 57782 6e11b2ba 57779->57782 57780->57779 57781->57780 57784 6e11b1d3 _memmove 57781->57784 57782->57685 57783->57767 57785 6e11b1eb SafeArrayUnaccessData 57784->57785 57785->57780 57785->57783 57786->57777 57788 6e118d88 LeaveCriticalSection 57787->57788 57788->57691 57788->57692 57790 6e11be01 57789->57790 57791 6e11be2c SafeArrayDestroy 57790->57791 57792 6e11be33 57790->57792 57791->57792 57794 6e11be6a IsBadReadPtr 57792->57794 57797 6e11be77 57792->57797 57798 6e11befd moneypunct 57792->57798 57793 6e11af30 92 API calls 57793->57798 57794->57797 57795 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57796 6e11c00f 57795->57796 57796->57693 57797->57793 57798->57795 57800 6e118e39 57799->57800 57801 6e118e7c EnterCriticalSection 57800->57801 57807 6e118f7f moneypunct 57800->57807 57802 6e118e9e 57801->57802 57803 6e118eac LeaveCriticalSection 57802->57803 57804 6e118ebd 57803->57804 57803->57807 57805 6e169bb5 77 API calls 57804->57805 57806 6e118ec4 _memset 57805->57806 57809 6e11c020 VariantInit VariantInit VariantInit VariantInit 57806->57809 57807->57695 57812 6e11c098 57809->57812 57810 6e11c307 VariantClear VariantClear VariantClear VariantClear 57811 6e11c336 57810->57811 57811->57807 57812->57810 57817 6e11b300 57812->57817 57814 6e11c10c 57814->57810 57816 6e11c234 57814->57816 57828 6e12b6b0 VariantInit VariantInit 57814->57828 57816->57810 57826 6e11b364 57817->57826 57818 6e11b524 SafeArrayDestroy 57819 6e11b52e 57818->57819 57820 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57819->57820 57821 6e11b5a1 57820->57821 57821->57814 57822 6e11b3e1 SafeArrayGetLBound SafeArrayGetUBound 57824 6e11b4be 57822->57824 57822->57826 57823 6e11b416 SafeArrayGetElement 57823->57826 57827 6e11b3c8 57823->57827 57825 6e11b5d8 VariantClear 57824->57825 57824->57827 57825->57827 57826->57822 57826->57823 57826->57824 57826->57827 57827->57818 57827->57819 57830 6e12b75a 57828->57830 57829 6e12be96 VariantClear VariantClear 57831 6e12beb6 57829->57831 57830->57829 57832 6e12b7b9 SafeArrayCreateVector 57830->57832 57835 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57831->57835 57833 6e12b7e4 57832->57833 57834 6e12b7ec SafeArrayPutElement VariantClear 57832->57834 57833->57834 57838 6e12b80f 57834->57838 57849 6e12b8fa 57834->57849 57836 6e12beef 57835->57836 57836->57816 57837 6e12be8f SafeArrayDestroy 57837->57829 57839 6e12b913 57838->57839 57840 6e12b871 57838->57840 57838->57849 57839->57849 57947 6e11dcd0 10 API calls 57839->57947 57840->57849 57945 6e12dbc0 77 API calls 2 library calls 57840->57945 57843 6e12b93f 57843->57849 57948 6e11dcd0 10 API calls 57843->57948 57844 6e12b8d3 57946 6e12c850 75 API calls std::tr1::_Xweak 57844->57946 57846 6e12b962 57848 6e12b8ef 57846->57848 57846->57849 57949 6e11dcd0 10 API calls 57846->57949 57848->57849 57851 6e12ba0b VariantClear 57848->57851 57849->57829 57849->57837 57851->57849 57852 6e12ba23 57851->57852 57852->57849 57853 6e169bb5 77 API calls 57852->57853 57854 6e12baa2 57853->57854 57887 6e12bf00 VariantInit VariantInit VariantInit VariantInit 57854->57887 57857 6e12baeb 57857->57849 57859 6e12bb09 57857->57859 57951 6e1247d0 107 API calls 57857->57951 57859->57849 57904 6e1249b0 VariantInit VariantInit VariantInit SafeArrayCreateVector 57859->57904 57862 6e12bb2c 57862->57849 57916 6e12cd20 VariantInit VariantInit VariantInit SafeArrayCreateVector 57862->57916 57864 6e12bb49 57864->57849 57928 6e124170 VariantInit VariantInit SafeArrayCreateVector 57864->57928 57866 6e12bb85 57866->57849 57868 6e12bca2 57866->57868 57939 6e11c4a0 VariantInit VariantCopy 57866->57939 57870 6e11c4a0 2 API calls 57868->57870 57875 6e12bd78 57868->57875 57869 6e12bbdb VariantInit VariantInit SafeArrayCreateVector SafeArrayPutElement VariantClear 57941 6e12db10 SafeArrayCreateVector SafeArrayPutElement 57869->57941 57871 6e12bcdd VariantInit VariantInit SafeArrayCreateVector SafeArrayPutElement VariantClear 57870->57871 57878 6e12db10 3 API calls 57871->57878 57875->57849 57880 6e169bb5 77 API calls 57875->57880 57879 6e12bd5d VariantClear VariantClear 57878->57879 57879->57875 57881 6e12bdf7 57880->57881 57882 6e11c4a0 2 API calls 57881->57882 57883 6e12be10 57881->57883 57882->57883 57883->57849 57884 6e169bb5 77 API calls 57883->57884 57885 6e12be59 57884->57885 57885->57849 57886 6e11c4a0 2 API calls 57885->57886 57886->57849 57888 6e12bf6c 57887->57888 57952 6e12c150 SafeArrayCreateVector 57888->57952 57891 6e12c150 6 API calls 57892 6e12bfdd 57891->57892 57903 6e12c096 57892->57903 57962 6e12dc40 57892->57962 57894 6e12c10e VariantClear VariantClear VariantClear VariantClear 57895 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57894->57895 57896 6e12baca 57895->57896 57896->57849 57896->57857 57950 6e1247d0 107 API calls 57896->57950 57897 6e12c00c 57977 6e1244c0 VariantInit VariantInit SafeArrayCreateVector 57897->57977 57900 6e12c044 VariantInit VariantCopy 57901 6e12c05e 57900->57901 57902 6e12c07c VariantInit VariantCopy 57901->57902 57901->57903 57902->57903 57903->57894 57905 6e124a30 SafeArrayPutElement VariantClear 57904->57905 57906 6e124a28 57904->57906 57909 6e124a53 57905->57909 57915 6e124b52 57905->57915 57906->57905 57907 6e124b65 SafeArrayDestroy 57908 6e124b6c VariantClear VariantClear VariantClear 57907->57908 57908->57862 57909->57915 57991 6e11db30 VariantInit SafeArrayCreateVector SafeArrayPutElement 57909->57991 57911 6e124b39 57911->57915 57995 6e1256b0 57911->57995 57915->57907 57915->57908 57917 6e12cda1 SafeArrayPutElement VariantClear 57916->57917 57918 6e12cd99 57916->57918 57921 6e12cdc6 57917->57921 57922 6e12d292 57917->57922 57918->57917 57919 6e12d2a4 SafeArrayDestroy 57920 6e12d2ab VariantClear VariantClear VariantClear 57919->57920 57920->57864 57921->57922 57923 6e11db30 5 API calls 57921->57923 57922->57919 57922->57920 57924 6e12d279 57923->57924 57924->57922 57925 6e1256b0 83 API calls 57924->57925 57926 6e12d288 57925->57926 57927 6e126880 9 API calls 57926->57927 57927->57922 57929 6e1241e4 57928->57929 57930 6e1241ec SafeArrayPutElement VariantClear 57928->57930 57929->57930 57931 6e124460 57930->57931 57935 6e12420f 57930->57935 57932 6e124473 VariantClear VariantClear 57931->57932 57933 6e12446c SafeArrayDestroy 57931->57933 57934 6e124493 57932->57934 57933->57932 57934->57866 57935->57931 57936 6e124455 57935->57936 58013 6e16919e 67 API calls 3 library calls 57935->58013 58010 6e12ddb0 57936->58010 57940 6e11c4b9 57939->57940 57940->57869 57944 6e12db4f 57941->57944 57942 6e12dba1 SafeArrayDestroy 57943 6e12bc60 VariantClear VariantClear 57942->57943 57943->57868 57944->57942 57944->57943 57945->57844 57946->57848 57947->57843 57948->57846 57949->57848 57950->57857 57951->57859 57953 6e12c191 57952->57953 57954 6e12c1d9 57952->57954 57953->57954 57955 6e12c1af SafeArrayPutElement VariantClear 57953->57955 57956 6e12c239 57954->57956 57959 6e12c20c VariantCopy 57954->57959 57955->57953 57955->57956 57957 6e12bfb9 57956->57957 57958 6e12c23d SafeArrayDestroy 57956->57958 57957->57891 57957->57903 57958->57957 57960 6e12c225 57959->57960 57961 6e12c22b VariantClear 57959->57961 57960->57961 57961->57956 57964 6e12dc4d 57962->57964 57963 6e169bb5 77 API calls 57965 6e12dc85 57963->57965 57964->57963 57966 6e12dc8c 57965->57966 57967 6e169533 std::exception::exception 66 API calls 57965->57967 57966->57897 57968 6e12dcca 57967->57968 57969 6e16ac75 __CxxThrowException@8 RaiseException 57968->57969 57970 6e12dcdf 57969->57970 57971 6e12dd23 57970->57971 57972 6e169bb5 77 API calls 57970->57972 57971->57897 57973 6e12dcf8 57972->57973 57973->57971 57974 6e169533 std::exception::exception 66 API calls 57973->57974 57975 6e12dd0e 57974->57975 57976 6e16ac75 __CxxThrowException@8 RaiseException 57975->57976 57976->57971 57978 6e124542 SafeArrayPutElement VariantClear 57977->57978 57979 6e12453a 57977->57979 57980 6e12456a SafeArrayCreateVector SafeArrayPutElement 57978->57980 57989 6e12476c 57978->57989 57979->57978 57981 6e12459e SafeArrayPutElement 57980->57981 57980->57989 57984 6e1245bf SafeArrayPutElement 57981->57984 57981->57989 57982 6e124776 SafeArrayDestroy 57983 6e12477d VariantClear VariantClear 57982->57983 57985 6e12479d 57983->57985 57986 6e1245d8 57984->57986 57984->57989 57985->57900 57985->57903 57987 6e12475f 57986->57987 57988 6e16919e std::tr1::_Xweak 67 API calls 57986->57988 57986->57989 57990 6e12de60 95 API calls 57987->57990 57988->57987 57989->57982 57989->57983 57990->57989 57992 6e11db8c 57991->57992 57993 6e11dbf0 SafeArrayDestroy 57992->57993 57994 6e11dbf7 VariantClear 57992->57994 57993->57994 57994->57911 57996 6e1256e0 57995->57996 57997 6e1256f4 57995->57997 57996->57997 57999 6e1257c0 81 API calls 57996->57999 57998 6e1257c0 81 API calls 57997->57998 58000 6e124b48 57997->58000 58001 6e12570d VariantInit VariantCopy 57997->58001 57998->57997 57999->57997 58002 6e126880 VariantInit VariantInit 58000->58002 58001->57997 58001->58000 58003 6e1691e1 58002->58003 58004 6e1268cd SafeArrayCreateVector SafeArrayPutElement VariantClear 58003->58004 58005 6e126913 SafeArrayPutElement 58004->58005 58008 6e12692d 58004->58008 58005->58008 58006 6e126980 SafeArrayDestroy 58007 6e126987 58006->58007 58009 6e126994 VariantClear VariantClear 58007->58009 58008->58006 58008->58007 58009->57915 58011 6e1266a0 107 API calls 58010->58011 58012 6e12ddd5 58011->58012 58012->57931 58013->57936 58015 6e169bb5 77 API calls 58014->58015 58016 6e11632b 58015->58016 58017 6e169bb5 77 API calls 58016->58017 58018 6e116350 58017->58018 58019 6e115050 77 API calls 58018->58019 58020 6e11636e 58019->58020 58021 6e169bb5 77 API calls 58020->58021 58022 6e116375 58021->58022 58023 6e115050 77 API calls 58022->58023 58024 6e116392 58023->58024 58025 6e169bb5 77 API calls 58024->58025 58026 6e116399 58025->58026 58027 6e115050 77 API calls 58026->58027 58028 6e1163b3 58027->58028 58029 6e169bb5 77 API calls 58028->58029 58030 6e1163c9 58029->58030 58031 6e1163d4 58030->58031 58032 6e116459 58030->58032 58034 6e1116b0 327 API calls 58031->58034 58039 6e169533 66 API calls std::exception::_Copy_str 58032->58039 58038 6e116402 moneypunct 58034->58038 58035 6e11646b 58040 6e16ac75 RaiseException 58035->58040 58037 6e116482 58038->57437 58039->58035 58040->58037 58560 6e133eb0 58561 6e169bb5 77 API calls 58560->58561 58562 6e133f11 58561->58562 58563 6e169bb5 77 API calls 58562->58563 58564 6e133f36 58563->58564 58565 6e115050 77 API calls 58564->58565 58566 6e133f50 58565->58566 58567 6e169bb5 77 API calls 58566->58567 58568 6e133f57 58567->58568 58569 6e115050 77 API calls 58568->58569 58570 6e133f71 58569->58570 58571 6e169bb5 77 API calls 58570->58571 58572 6e133f78 58571->58572 58573 6e115050 77 API calls 58572->58573 58574 6e133f92 58573->58574 58575 6e169bb5 77 API calls 58574->58575 58576 6e133fab 58575->58576 58577 6e133fb2 58576->58577 58578 6e134031 58576->58578 58580 6e1116b0 327 API calls 58577->58580 58601 6e169533 66 API calls std::exception::_Copy_str 58578->58601 58585 6e133fdc moneypunct 58580->58585 58581 6e134047 58602 6e16ac75 RaiseException 58581->58602 58583 6e13405e 58584 6e169bb5 77 API calls 58583->58584 58586 6e1340b5 58584->58586 58587 6e169bb5 77 API calls 58586->58587 58588 6e1340d8 58587->58588 58589 6e115050 77 API calls 58588->58589 58590 6e1340f2 58589->58590 58591 6e169bb5 77 API calls 58590->58591 58592 6e1340f9 58591->58592 58593 6e115050 77 API calls 58592->58593 58594 6e134113 58593->58594 58595 6e169bb5 77 API calls 58594->58595 58596 6e13411a 58595->58596 58597 6e115050 77 API calls 58596->58597 58598 6e134134 58597->58598 58599 6e1116b0 327 API calls 58598->58599 58600 6e134169 moneypunct 58599->58600 58601->58581 58602->58583 58041 6e129357 58042 6e129368 58041->58042 58178 6e1269c0 58042->58178 58044 6e128739 58045 6e12ae62 SafeArrayDestroy 58044->58045 58046 6e12ae68 58044->58046 58045->58046 58047 6e12ae72 SafeArrayDestroy 58046->58047 58048 6e12ae7b 58046->58048 58047->58048 58050 6e12ae85 SafeArrayDestroy 58048->58050 58051 6e12ae8e 58048->58051 58049 6e1293ac 58049->58044 58052 6e1269c0 11 API calls 58049->58052 58050->58051 58053 6e12aea1 58051->58053 58054 6e12ae98 SafeArrayDestroy 58051->58054 58061 6e12943a 58052->58061 58055 6e12aeb4 58053->58055 58056 6e12aeab SafeArrayDestroy 58053->58056 58054->58053 58057 6e12aec7 58055->58057 58058 6e12aebe SafeArrayDestroy 58055->58058 58056->58055 58059 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58057->58059 58058->58057 58060 6e12aef5 58059->58060 58061->58044 58062 6e1294b1 SafeArrayGetLBound SafeArrayGetUBound 58061->58062 58063 6e129658 58062->58063 58068 6e1294ef 58062->58068 58064 6e11d920 3 API calls 58063->58064 58070 6e12968f 58064->58070 58065 6e1294fd SafeArrayGetElement 58065->58044 58065->58068 58066 6e12840e 58066->58044 58226 6e11dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 58066->58226 58068->58044 58068->58063 58068->58065 58068->58066 58069 6e128441 58069->58044 58071 6e1284af SafeArrayGetLBound SafeArrayGetUBound 58069->58071 58070->58044 58078 6e129794 SafeArrayGetLBound SafeArrayGetUBound 58070->58078 58072 6e128616 58071->58072 58073 6e1284ed SafeArrayGetElement 58071->58073 58227 6e11dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 58072->58227 58073->58044 58079 6e128518 58073->58079 58075 6e12862b 58075->58044 58228 6e11dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 58075->58228 58077 6e12864b 58077->58044 58229 6e11dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 58077->58229 58081 6e1297d2 58078->58081 58090 6e129c5e 58078->58090 58079->58072 58079->58073 58082 6e123a90 8 API calls 58079->58082 58081->58066 58084 6e1297e3 SafeArrayGetElement 58081->58084 58081->58090 58102 6e123a90 8 API calls 58081->58102 58082->58079 58083 6e12866b 58083->58044 58230 6e11dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 58083->58230 58084->58044 58084->58081 58086 6e11d920 3 API calls 58093 6e129cf8 58086->58093 58087 6e12868a 58087->58044 58231 6e11dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 58087->58231 58089 6e1286aa 58089->58044 58091 6e1269c0 11 API calls 58089->58091 58090->58086 58092 6e1286cf 58091->58092 58092->58044 58094 6e1269c0 11 API calls 58092->58094 58093->58044 58095 6e129d4f SafeArrayGetLBound SafeArrayGetUBound 58093->58095 58096 6e1286f5 58094->58096 58097 6e129ec7 58095->58097 58105 6e129d8d 58095->58105 58096->58044 58100 6e1269c0 11 API calls 58096->58100 58099 6e11d920 3 API calls 58097->58099 58098 6e129da0 SafeArrayGetElement 58098->58044 58098->58105 58101 6e129f09 58099->58101 58100->58044 58101->58044 58103 6e11d920 3 API calls 58101->58103 58102->58081 58106 6e129f8b 58103->58106 58104 6e123a90 8 API calls 58104->58105 58105->58097 58105->58098 58105->58104 58106->58044 58107 6e11d920 3 API calls 58106->58107 58108 6e12a01f 58107->58108 58108->58044 58109 6e11d920 3 API calls 58108->58109 58110 6e12a09b 58109->58110 58110->58044 58111 6e12a1ac SafeArrayGetLBound SafeArrayGetUBound 58110->58111 58112 6e12a7b3 58111->58112 58127 6e12a1ea 58111->58127 58113 6e11d920 3 API calls 58112->58113 58114 6e12a7ce 58113->58114 58114->58044 58116 6e11d920 3 API calls 58114->58116 58115 6e12a1fd SafeArrayGetElement 58117 6e12a815 58115->58117 58115->58127 58116->58117 58117->58044 58185 6e1264d0 VariantInit VariantInit VariantInit SafeArrayCreateVector 58117->58185 58118 6e123a90 8 API calls 58118->58127 58120 6e12a91d 58120->58044 58121 6e1264d0 109 API calls 58120->58121 58122 6e12a950 58121->58122 58122->58044 58123 6e1264d0 109 API calls 58122->58123 58124 6e12a983 58123->58124 58124->58044 58125 6e1264d0 109 API calls 58124->58125 58126 6e12a9b6 58125->58126 58126->58044 58128 6e1264d0 109 API calls 58126->58128 58127->58112 58127->58115 58127->58118 58129 6e12a9e9 58128->58129 58129->58044 58130 6e1264d0 109 API calls 58129->58130 58131 6e12aa1c 58130->58131 58131->58044 58132 6e1264d0 109 API calls 58131->58132 58133 6e12aa4f 58132->58133 58133->58044 58134 6e1264d0 109 API calls 58133->58134 58135 6e12aa82 58134->58135 58135->58044 58136 6e1264d0 109 API calls 58135->58136 58137 6e12aab5 58136->58137 58137->58044 58138 6e1264d0 109 API calls 58137->58138 58139 6e12aae8 58138->58139 58139->58044 58140 6e1264d0 109 API calls 58139->58140 58141 6e12ab1e 58140->58141 58141->58044 58142 6e12abd0 58141->58142 58146 6e12ac5a 58141->58146 58199 6e122970 58142->58199 58232 6e12d790 77 API calls 3 library calls 58146->58232 58148 6e12ac37 58148->58044 58233 6e111690 77 API calls 58148->58233 58150 6e12ad36 58234 6e1150c0 77 API calls 58150->58234 58152 6e12ad4d 58153 6e169bb5 77 API calls 58152->58153 58154 6e12ad5d 58153->58154 58155 6e115050 77 API calls 58154->58155 58156 6e12ad77 58155->58156 58235 6e1150c0 77 API calls 58156->58235 58158 6e12ad82 58159 6e169bb5 77 API calls 58158->58159 58160 6e12ad89 58159->58160 58161 6e115050 77 API calls 58160->58161 58162 6e12ada7 58161->58162 58163 6e169bb5 77 API calls 58162->58163 58164 6e12adae 58163->58164 58165 6e115050 77 API calls 58164->58165 58166 6e12adcc 58165->58166 58236 6e1150c0 77 API calls 58166->58236 58168 6e12add7 58169 6e169bb5 77 API calls 58168->58169 58170 6e12ade1 58169->58170 58171 6e115050 77 API calls 58170->58171 58172 6e12adfb 58171->58172 58237 6e1150c0 77 API calls 58172->58237 58174 6e12ae06 58238 6e1150c0 77 API calls 58174->58238 58176 6e12ae11 58239 6e112a40 327 API calls 58176->58239 58179 6e1269f3 58178->58179 58180 6e126a01 SafeArrayGetLBound SafeArrayGetUBound 58178->58180 58179->58180 58182 6e126a2a 58180->58182 58184 6e126a92 58180->58184 58181 6e126a30 SafeArrayGetElement 58181->58182 58181->58184 58182->58181 58182->58184 58240 6e123990 8 API calls 58182->58240 58184->58049 58186 6e126554 58185->58186 58187 6e12655c SafeArrayPutElement VariantClear 58185->58187 58186->58187 58188 6e126584 SafeArrayPutElement VariantClear 58187->58188 58198 6e126655 58187->58198 58192 6e1265cd 58188->58192 58188->58198 58190 6e126665 SafeArrayDestroy 58191 6e12666c VariantClear VariantClear VariantClear 58190->58191 58191->58120 58193 6e11db30 5 API calls 58192->58193 58192->58198 58194 6e12663a 58193->58194 58195 6e1256b0 83 API calls 58194->58195 58194->58198 58196 6e12664a 58195->58196 58197 6e126880 9 API calls 58196->58197 58197->58198 58198->58190 58198->58191 58209 6e1229c3 58199->58209 58200 6e122d21 58200->58044 58213 6e12d2e0 58200->58213 58201 6e1229ee SafeArrayGetLBound SafeArrayGetUBound 58203 6e122a20 SafeArrayGetElement 58201->58203 58207 6e122c53 58201->58207 58202 6e122d1a SafeArrayDestroy 58202->58200 58203->58207 58203->58209 58204 6e122ab6 VariantInit 58204->58209 58205 6e122b3a VariantInit 58205->58209 58206 6e122c8b VariantClear VariantClear 58206->58207 58207->58200 58207->58202 58208 6e122d3a VariantClear VariantClear VariantClear 58208->58207 58209->58200 58209->58201 58209->58203 58209->58204 58209->58205 58209->58206 58209->58207 58209->58208 58210 6e122cb6 VariantClear VariantClear VariantClear 58209->58210 58211 6e122bf9 VariantClear VariantClear VariantClear 58209->58211 58210->58207 58211->58209 58214 6e169bb5 77 API calls 58213->58214 58215 6e12d32f 58214->58215 58216 6e12d3db 58215->58216 58217 6e12d33e 58215->58217 58252 6e169533 66 API calls std::exception::_Copy_str 58216->58252 58241 6e12c530 VariantInit VariantInit SafeArrayCreateVector 58217->58241 58219 6e12d3ed 58253 6e16ac75 RaiseException 58219->58253 58221 6e12d404 58224 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58225 6e12d3d5 58224->58225 58225->58148 58226->58069 58227->58075 58228->58077 58229->58083 58230->58087 58231->58089 58232->58148 58233->58150 58234->58152 58235->58158 58236->58168 58237->58174 58238->58176 58239->58044 58240->58182 58242 6e12c5a4 58241->58242 58243 6e12c5ac SafeArrayPutElement VariantClear 58241->58243 58242->58243 58244 6e12c7e4 58243->58244 58248 6e12c5cf 58243->58248 58245 6e12c7f0 SafeArrayDestroy 58244->58245 58246 6e12c7f7 VariantClear VariantClear 58244->58246 58245->58246 58247 6e12c817 58246->58247 58247->58224 58248->58244 58249 6e12c7d9 58248->58249 58257 6e16919e 67 API calls 3 library calls 58248->58257 58254 6e12df70 58249->58254 58252->58219 58253->58221 58258 6e12d410 58254->58258 58256 6e12df80 58256->58244 58257->58249 58259 6e12d472 VariantInit VariantInit VariantInit 58258->58259 58260 6e12d44e 58258->58260 58265 6e12d470 _memmove 58259->58265 58260->58256 58261 6e12d704 VariantClear VariantClear VariantClear 58261->58265 58270 6e12d75d 58261->58270 58262 6e169d66 _malloc 66 API calls 58262->58265 58263 6e12d579 SafeArrayCreateVector SafeArrayCreateVector SafeArrayAccessData 58263->58265 58264 6e12d5ec SafeArrayPutElement 58264->58265 58265->58259 58265->58261 58265->58262 58265->58263 58265->58264 58266 6e12d5d6 SafeArrayUnaccessData 58265->58266 58267 6e12d633 SafeArrayPutElement VariantClear 58265->58267 58269 6e12d6fa SafeArrayDestroy 58265->58269 58265->58270 58271 6e11db30 5 API calls 58265->58271 58272 6e1256b0 83 API calls 58265->58272 58273 6e126880 9 API calls 58265->58273 58274 6e169d2c 66 API calls 2 library calls 58265->58274 58266->58264 58267->58265 58269->58265 58270->58256 58271->58265 58272->58265 58273->58265 58274->58265 58275 6e16a510 58278 6e16fe93 58275->58278 58277 6e16a515 58279 6e16fec5 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 58278->58279 58280 6e16feb8 58278->58280 58281 6e16ff04 58279->58281 58280->58279 58282 6e16febc 58280->58282 58281->58282 58282->58277 58283 67026f8 58284 670272b 58283->58284 58312 5b8bf50 58284->58312 58316 5b8bf44 58284->58316 58285 67028de 58293 67029cb 58285->58293 58294 5b8c449 Wow64SetThreadContext 58285->58294 58295 5b8c450 Wow64SetThreadContext 58285->58295 58286 6702a0c 58296 5b8c548 VirtualAllocEx 58286->58296 58297 5b8c550 VirtualAllocEx 58286->58297 58287 6702a45 58287->58293 58302 5b8c668 WriteProcessMemory 58287->58302 58303 5b8c670 WriteProcessMemory 58287->58303 58288 6702cbb 58289 6702d0f 58288->58289 58310 5b8c449 Wow64SetThreadContext 58288->58310 58311 5b8c450 Wow64SetThreadContext 58288->58311 58298 5b8c668 WriteProcessMemory 58289->58298 58299 5b8c670 WriteProcessMemory 58289->58299 58290 6702b54 58290->58288 58300 5b8c668 WriteProcessMemory 58290->58300 58301 5b8c670 WriteProcessMemory 58290->58301 58291 6702da8 58292 6702df3 58291->58292 58304 5b8c449 Wow64SetThreadContext 58291->58304 58305 5b8c450 Wow64SetThreadContext 58291->58305 58306 5b8c7c8 ResumeThread 58292->58306 58307 5b8c7c0 ResumeThread 58292->58307 58294->58286 58295->58286 58296->58287 58297->58287 58298->58291 58299->58291 58300->58290 58301->58290 58302->58290 58303->58290 58304->58292 58305->58292 58306->58293 58307->58293 58310->58289 58311->58289 58313 5b8bfce CreateProcessA 58312->58313 58315 5b8c234 58313->58315 58318 5b8bfce CreateProcessA 58316->58318 58319 5b8c234 58318->58319 58603 6e16a42d 58604 6e16a438 58603->58604 58605 6e16a4b8 ___unDName 58603->58605 58604->58605 58609 6e16a468 58604->58609 58611 6e16a2ab 58604->58611 58607 6e16a498 58607->58605 58608 6e16a2ab __CRT_INIT@12 149 API calls 58607->58608 58608->58605 58609->58605 58609->58607 58610 6e16a2ab __CRT_INIT@12 149 API calls 58609->58610 58610->58607 58612 6e16a2b7 ___unDName 58611->58612 58613 6e16a2bf 58612->58613 58614 6e16a339 58612->58614 58663 6e16e904 HeapCreate 58613->58663 58616 6e16a33f 58614->58616 58617 6e16a39a 58614->58617 58621 6e16a35d 58616->58621 58630 6e16a2c8 ___unDName 58616->58630 58673 6e16d4e7 66 API calls _doexit 58616->58673 58618 6e16a39f 58617->58618 58619 6e16a3f8 58617->58619 58622 6e16e948 ___set_flsgetvalue 3 API calls 58618->58622 58619->58630 58681 6e16ec2f 79 API calls __freefls@4 58619->58681 58620 6e16a2c4 58623 6e16a2cf 58620->58623 58620->58630 58626 6e16a371 58621->58626 58674 6e16dd67 67 API calls std::exception::_Tidy 58621->58674 58628 6e16a3a4 58622->58628 58664 6e16ec9d 86 API calls 5 library calls 58623->58664 58677 6e16a384 70 API calls __mtterm 58626->58677 58678 6e16cb28 66 API calls __calloc_crt 58628->58678 58630->58609 58631 6e16a2d4 __RTC_Initialize 58635 6e16a2d8 58631->58635 58642 6e16a2e4 GetCommandLineA 58631->58642 58634 6e16a3b0 58634->58630 58637 6e16a3bc DecodePointer 58634->58637 58665 6e16e922 HeapDestroy 58635->58665 58636 6e16a367 58675 6e16e97c 70 API calls std::exception::_Tidy 58636->58675 58643 6e16a3d1 58637->58643 58640 6e16a2dd 58640->58630 58641 6e16a36c 58676 6e16e922 HeapDestroy 58641->58676 58666 6e16fc46 71 API calls 2 library calls 58642->58666 58646 6e16a3d5 58643->58646 58647 6e16a3ec 58643->58647 58679 6e16e9b9 66 API calls 4 library calls 58646->58679 58680 6e169d2c 66 API calls 2 library calls 58647->58680 58648 6e16a2f4 58667 6e16db22 73 API calls __calloc_crt 58648->58667 58652 6e16a3dc GetCurrentThreadId 58652->58630 58653 6e16a2fe 58654 6e16a302 58653->58654 58669 6e16fb8b 95 API calls 3 library calls 58653->58669 58668 6e16e97c 70 API calls std::exception::_Tidy 58654->58668 58657 6e16a30e 58658 6e16a322 58657->58658 58670 6e16f915 94 API calls 6 library calls 58657->58670 58658->58640 58672 6e16dd67 67 API calls std::exception::_Tidy 58658->58672 58661 6e16a317 58661->58658 58671 6e16d2fa 77 API calls 4 library calls 58661->58671 58663->58620 58664->58631 58665->58640 58666->58648 58667->58653 58668->58635 58669->58657 58670->58661 58671->58658 58672->58654 58673->58621 58674->58636 58675->58641 58676->58626 58677->58630 58678->58634 58679->58652 58680->58640 58681->58630 58343 6e12e2ce 58344 6e169bb5 77 API calls 58343->58344 58345 6e12e2d5 58344->58345 58346 6e12e2ee 58345->58346 58400 6e131fd0 58345->58400 58348 6e169bb5 77 API calls 58346->58348 58359 6e12e343 58346->58359 58351 6e12e327 58348->58351 58349 6e12e360 58352 6e169bb5 77 API calls 58349->58352 58350 6e12e3a6 58353 6e169bb5 77 API calls 58350->58353 58399 6e12e564 moneypunct 58350->58399 58425 6e12eae0 58351->58425 58354 6e12e367 58352->58354 58357 6e12e400 58353->58357 58440 6e131910 78 API calls 2 library calls 58354->58440 58355 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58358 6e12e76e 58355->58358 58361 6e169bb5 77 API calls 58357->58361 58359->58349 58359->58350 58364 6e12e428 58361->58364 58362 6e12e384 58441 6e131b20 11 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 58362->58441 58366 6e115050 77 API calls 58364->58366 58365 6e12e399 58365->58350 58367 6e12e442 58366->58367 58368 6e169bb5 77 API calls 58367->58368 58369 6e12e449 58368->58369 58370 6e115050 77 API calls 58369->58370 58371 6e12e463 58370->58371 58372 6e169bb5 77 API calls 58371->58372 58373 6e12e46a 58372->58373 58374 6e115050 77 API calls 58373->58374 58375 6e12e484 58374->58375 58376 6e169bb5 77 API calls 58375->58376 58377 6e12e48b 58376->58377 58378 6e115050 77 API calls 58377->58378 58379 6e12e4a5 58378->58379 58380 6e169bb5 77 API calls 58379->58380 58381 6e12e4ac 58380->58381 58382 6e115050 77 API calls 58381->58382 58383 6e12e4c6 58382->58383 58384 6e12e4d3 58383->58384 58442 6e16919e 67 API calls 3 library calls 58383->58442 58386 6e169bb5 77 API calls 58384->58386 58387 6e12e4e3 58386->58387 58388 6e115050 77 API calls 58387->58388 58389 6e12e4fd 58388->58389 58390 6e169bb5 77 API calls 58389->58390 58391 6e12e504 58390->58391 58392 6e115050 77 API calls 58391->58392 58393 6e12e51e 58392->58393 58394 6e169bb5 77 API calls 58393->58394 58395 6e12e525 58394->58395 58396 6e115050 77 API calls 58395->58396 58397 6e12e53f 58396->58397 58398 6e1116b0 327 API calls 58397->58398 58398->58399 58399->58355 58401 6e169bb5 77 API calls 58400->58401 58402 6e132013 58401->58402 58403 6e1321f3 58402->58403 58404 6e132020 58402->58404 58477 6e169533 66 API calls std::exception::_Copy_str 58403->58477 58443 6e136480 58404->58443 58407 6e13220b 58478 6e16ac75 RaiseException 58407->58478 58409 6e132226 58410 6e13206c 58459 6e1035f0 58410->58459 58412 6e13216e 58470 6e132300 58412->58470 58414 6e132194 58415 6e132300 77 API calls 58414->58415 58416 6e1321a0 58415->58416 58417 6e132300 77 API calls 58416->58417 58418 6e1321ad 58417->58418 58419 6e132300 77 API calls 58418->58419 58420 6e1321ba 58419->58420 58421 6e132300 77 API calls 58420->58421 58422 6e1321c6 58421->58422 58423 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58422->58423 58424 6e1321ef 58423->58424 58424->58346 58426 6e169bb5 77 API calls 58425->58426 58427 6e12eb17 58426->58427 58428 6e12eb22 58427->58428 58429 6e12f4c9 58427->58429 58523 6e16a25a GetSystemTimeAsFileTime 58428->58523 58531 6e169533 66 API calls std::exception::_Copy_str 58429->58531 58431 6e12f4dc 58532 6e16ac75 RaiseException 58431->58532 58434 6e12f4f1 58435 6e12eb5b 58525 6e169dfa 58435->58525 58440->58362 58441->58365 58442->58384 58444 6e13655d 58443->58444 58447 6e1364c8 58443->58447 58445 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58444->58445 58446 6e13657d 58445->58446 58446->58410 58447->58444 58448 6e13651d 58447->58448 58479 6e102f40 77 API calls 58447->58479 58448->58444 58482 6e102f40 77 API calls 58448->58482 58451 6e136535 58483 6e136400 77 API calls std::tr1::_Xweak 58451->58483 58452 6e1364f5 58480 6e136400 77 API calls std::tr1::_Xweak 58452->58480 58455 6e13654e 58484 6e16ac75 RaiseException 58455->58484 58456 6e13650e 58481 6e16ac75 RaiseException 58456->58481 58485 6e156d40 58459->58485 58462 6e136480 77 API calls 58463 6e10364c 58462->58463 58492 6e104b30 58463->58492 58465 6e1036a7 58496 6e1386e0 58465->58496 58467 6e1036bc 58468 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58467->58468 58469 6e103701 58468->58469 58469->58412 58471 6e13231d 58470->58471 58472 6e1323aa 58471->58472 58473 6e169bb5 77 API calls 58471->58473 58472->58414 58475 6e132331 58473->58475 58474 6e132374 moneypunct 58474->58414 58475->58474 58522 6e132480 77 API calls 58475->58522 58477->58407 58478->58409 58479->58452 58480->58456 58481->58448 58482->58451 58483->58455 58484->58444 58486 6e136480 77 API calls 58485->58486 58487 6e156d7f 58486->58487 58504 6e138d80 58487->58504 58490 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58491 6e103630 58490->58491 58491->58462 58493 6e104b65 58492->58493 58514 6e104fa0 58493->58514 58495 6e104b7f 58495->58465 58497 6e138728 58496->58497 58498 6e138765 58497->58498 58520 6e137cd0 77 API calls 3 library calls 58497->58520 58499 6e16948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58498->58499 58500 6e13878a 58499->58500 58500->58467 58502 6e138756 58521 6e16ac75 RaiseException 58502->58521 58505 6e169d66 _malloc 66 API calls 58504->58505 58508 6e138d8f 58505->58508 58506 6e138dbb 58506->58490 58507 6e1691f6 70 API calls 58507->58508 58508->58506 58508->58507 58509 6e138dc1 std::exception::exception 58508->58509 58512 6e169d66 _malloc 66 API calls 58508->58512 58513 6e16ac75 RaiseException 58509->58513 58511 6e138df0 58512->58508 58513->58511 58515 6e169bb5 77 API calls 58514->58515 58516 6e104fcf 58515->58516 58518 6e104ff1 58516->58518 58519 6e105050 81 API calls _memcpy_s 58516->58519 58518->58495 58519->58518 58520->58502 58521->58498 58522->58472 58524 6e16a28a __aulldiv 58523->58524 58524->58435 58533 6e16eae6 58525->58533 58528 6e169e0c 58529 6e16eae6 __getptd 66 API calls 58528->58529 58530 6e12eb69 58529->58530 58530->58359 58531->58431 58532->58434 58538 6e16ea6d GetLastError 58533->58538 58535 6e16eaee 58537 6e12eb61 58535->58537 58553 6e16d4f6 66 API calls 3 library calls 58535->58553 58537->58528 58554 6e16e948 TlsGetValue 58538->58554 58541 6e16ea8c 58557 6e16cb28 66 API calls __calloc_crt 58541->58557 58542 6e16eada SetLastError 58542->58535 58544 6e16ea98 58544->58542 58545 6e16eaa0 DecodePointer 58544->58545 58546 6e16eab5 58545->58546 58547 6e16ead1 58546->58547 58548 6e16eab9 58546->58548 58559 6e169d2c 66 API calls 2 library calls 58547->58559 58558 6e16e9b9 66 API calls 4 library calls 58548->58558 58551 6e16ead7 58551->58542 58552 6e16eac1 GetCurrentThreadId 58552->58542 58555 6e16e95d DecodePointer TlsSetValue 58554->58555 58556 6e16e978 58554->58556 58555->58556 58556->58541 58556->58542 58557->58544 58558->58552 58559->58551 58682 6e1316af 58683 6e1316b4 58682->58683 58684 6e13170f 58683->58684 58685 6e169bb5 77 API calls 58683->58685 58686 6e131769 58684->58686 58687 6e169bb5 77 API calls 58684->58687 58688 6e1316cd 58685->58688 58689 6e1317c3 58686->58689 58692 6e169bb5 77 API calls 58686->58692 58690 6e131727 58687->58690 58695 6e1316e9 58688->58695 58732 6e12ea40 58688->58732 58691 6e13181d 58689->58691 58694 6e169bb5 77 API calls 58689->58694 58697 6e12ea40 78 API calls 58690->58697 58699 6e131743 58690->58699 58698 6e169bb5 77 API calls 58691->58698 58704 6e131877 58691->58704 58696 6e131781 58692->58696 58700 6e1317db 58694->58700 58737 6e118400 58695->58737 58702 6e13179d 58696->58702 58710 6e12ea40 78 API calls 58696->58710 58697->58699 58706 6e131835 58698->58706 58707 6e118400 77 API calls 58699->58707 58708 6e1317f7 58700->58708 58715 6e12ea40 78 API calls 58700->58715 58712 6e118400 77 API calls 58702->58712 58703 6e1318d1 58704->58703 58705 6e169bb5 77 API calls 58704->58705 58711 6e13188f 58705->58711 58713 6e131851 58706->58713 58719 6e12ea40 78 API calls 58706->58719 58714 6e13175f 58707->58714 58721 6e118400 77 API calls 58708->58721 58710->58702 58717 6e1318ab 58711->58717 58723 6e12ea40 78 API calls 58711->58723 58718 6e1317b9 58712->58718 58725 6e118400 77 API calls 58713->58725 58746 6e1180b0 67 API calls moneypunct 58714->58746 58715->58708 58727 6e118400 77 API calls 58717->58727 58747 6e1180b0 67 API calls moneypunct 58718->58747 58719->58713 58722 6e131813 58721->58722 58748 6e1180b0 67 API calls moneypunct 58722->58748 58723->58717 58728 6e13186d 58725->58728 58729 6e1318c7 58727->58729 58749 6e1180b0 67 API calls moneypunct 58728->58749 58750 6e1180b0 67 API calls moneypunct 58729->58750 58733 6e169bb5 77 API calls 58732->58733 58734 6e12ea6b 58733->58734 58735 6e12ea7e SysAllocString 58734->58735 58736 6e12ea99 58734->58736 58735->58736 58736->58695 58738 6e169bb5 77 API calls 58737->58738 58739 6e11840d 58738->58739 58740 6e118416 58739->58740 58751 6e169533 66 API calls std::exception::_Copy_str 58739->58751 58745 6e1180b0 67 API calls moneypunct 58740->58745 58742 6e11844e 58752 6e16ac75 RaiseException 58742->58752 58744 6e118463 58745->58684 58746->58686 58747->58689 58748->58691 58749->58704 58750->58703 58751->58742 58752->58744

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 720 6e12b6b0-6e12b758 VariantInit * 2 721 6e12b764-6e12b769 720->721 722 6e12b75a-6e12b75f call 6e17c1e0 720->722 724 6e12b773-6e12b784 721->724 725 6e12b76b-6e12b770 721->725 722->721 727 6e12be96-6e12beb4 VariantClear * 2 724->727 728 6e12b78a-6e12b791 724->728 725->724 729 6e12beb6-6e12bebb 727->729 730 6e12bebe-6e12beca 727->730 731 6e12b793-6e12b798 728->731 732 6e12b7b9-6e12b7e2 SafeArrayCreateVector 728->732 729->730 735 6e12bed4-6e12bef2 call 6e16948b 730->735 736 6e12becc-6e12bed1 730->736 737 6e12b7a2-6e12b7b3 731->737 738 6e12b79a-6e12b79f 731->738 733 6e12b7e4-6e12b7e7 732->733 734 6e12b7ec-6e12b809 SafeArrayPutElement VariantClear 732->734 733->734 740 6e12be85-6e12be8d 734->740 741 6e12b80f-6e12b81d 734->741 736->735 737->727 737->732 738->737 740->727 744 6e12be8f-6e12be90 SafeArrayDestroy 740->744 745 6e12b829-6e12b841 741->745 746 6e12b81f-6e12b824 call 6e17c1e0 741->746 744->727 745->740 749 6e12b847-6e12b853 745->749 746->745 749->740 750 6e12b859-6e12b85e 749->750 750->740 751 6e12b864-6e12b86b 750->751 752 6e12b913-6e12b917 751->752 753 6e12b871-6e12b87e 751->753 754 6e12b921-6e12b941 call 6e11dcd0 752->754 755 6e12b919-6e12b91b 752->755 756 6e12b880-6e12b882 753->756 757 6e12b888-6e12b8f8 call 6e12dbc0 call 6e125790 call 6e12c850 753->757 754->740 762 6e12b947-6e12b964 call 6e11dcd0 754->762 755->740 755->754 756->740 756->757 772 6e12b904-6e12b90e call 6e12e800 757->772 773 6e12b8fa-6e12b8ff call 6e12e800 757->773 762->740 768 6e12b96a-6e12b96d 762->768 770 6e12b993-6e12b9bf 768->770 771 6e12b96f-6e12b98d call 6e11dcd0 768->771 776 6e12b9c1-6e12b9c6 call 6e17c1e0 770->776 777 6e12b9cb-6e12ba1d VariantClear 770->777 771->740 771->770 772->770 784 6e12be83 773->784 776->777 777->740 785 6e12ba23-6e12ba31 777->785 784->740 786 6e12ba33-6e12ba38 call 6e17c1e0 785->786 787 6e12ba3d-6e12ba8b 785->787 786->787 787->740 790 6e12ba91-6e12ba95 787->790 790->740 791 6e12ba9b-6e12baa7 call 6e169bb5 790->791 794 6e12bab6 791->794 795 6e12baa9-6e12bab4 791->795 796 6e12bab8-6e12bacc call 6e12bf00 794->796 795->796 796->740 799 6e12bad2-6e12bada 796->799 800 6e12baf3-6e12baf8 799->800 801 6e12badc-6e12baed call 6e1247d0 799->801 803 6e12bb11-6e12bb2e call 6e1249b0 800->803 804 6e12bafa-6e12bb0b call 6e1247d0 800->804 801->740 801->800 803->740 810 6e12bb34-6e12bb4b call 6e12cd20 803->810 804->740 804->803 810->740 813 6e12bb51-6e12bb8e call 6e125790 call 6e124170 810->813 818 6e12bb90-6e12bb95 call 6e12e800 813->818 819 6e12bb9a-6e12bba8 call 6e12e800 813->819 818->784 824 6e12bca2 819->824 825 6e12bbae-6e12bbc0 819->825 826 6e12bca8-6e12bcae 824->826 825->824 827 6e12bbc6-6e12bc5b call 6e11c4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6e12db10 825->827 828 6e12bcb4-6e12bcc6 826->828 829 6e12bd78-6e12bdc8 826->829 839 6e12bc60-6e12bc75 827->839 828->829 831 6e12bccc-6e12bd76 call 6e11c4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6e12db10 VariantClear * 2 828->831 829->784 840 6e12bdce-6e12bdd7 829->840 831->829 842 6e12bc90-6e12bca0 VariantClear * 2 839->842 843 6e12bc77-6e12bc8d 839->843 840->784 844 6e12bddd-6e12bde4 840->844 842->826 843->842 844->784 846 6e12bdea-6e12be03 call 6e169bb5 844->846 850 6e12be12 846->850 851 6e12be05-6e12be10 call 6e11c4a0 846->851 853 6e12be14-6e12be3c 850->853 851->853 855 6e12be3e-6e12be50 853->855 856 6e12be7f 853->856 855->856 857 6e12be52-6e12be65 call 6e169bb5 855->857 856->784 860 6e12be71 857->860 861 6e12be67-6e12be6f call 6e11c4a0 857->861 863 6e12be73-6e12be7c 860->863 861->863 863->856
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12B73F
                                          • VariantInit.OLEAUT32(?), ref: 6E12B748
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12B7BE
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12B7F5
                                          • VariantClear.OLEAUT32(?), ref: 6E12B801
                                            • Part of subcall function 6E12C850: VariantInit.OLEAUT32(?), ref: 6E12C88F
                                            • Part of subcall function 6E12C850: VariantInit.OLEAUT32(?), ref: 6E12C895
                                            • Part of subcall function 6E12C850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12C8A0
                                            • Part of subcall function 6E12C850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E12C8D5
                                            • Part of subcall function 6E12C850: VariantClear.OLEAUT32(?), ref: 6E12C8E1
                                          • VariantClear.OLEAUT32(?), ref: 6E12BA15
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12BE90
                                          • VariantClear.OLEAUT32(?), ref: 6E12BEA3
                                          • VariantClear.OLEAUT32(?), ref: 6E12BEA9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                          • String ID:
                                          • API String ID: 2012514194-0
                                          • Opcode ID: 821904e55054e1d7a477b59478dfd475ec97dd080327a7c3eafa152e24d88c71
                                          • Instruction ID: 2f89185156bd5875331ba8ea7686b190a9e4463f4c0ce1694695fa760d46c888
                                          • Opcode Fuzzy Hash: 821904e55054e1d7a477b59478dfd475ec97dd080327a7c3eafa152e24d88c71
                                          • Instruction Fuzzy Hash: C1525071900219DFDB14DFA8C880BDEBBB9BF59300F1485A9E509AB355DB30A985DF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 865 6700eb3-6700ece 867 6700ed4-6700ee6 865->867 868 67019bb-67019bf 865->868 874 6700f15-6700f36 867->874 875 6700ee8-6700f0a 867->875 869 67019c1-67019cd 868->869 870 67019d2-6701a58 868->870 871 6701ee8-6701ef5 869->871 887 6701a82 870->887 888 6701a5a-6701a66 870->888 879 6700f3c-6700f52 874->879 875->879 880 6700f54-6700f58 879->880 881 6700f5e-6701042 879->881 880->868 880->881 904 6701044-6701050 881->904 905 670106c 881->905 891 6701a88-6701aaf 887->891 889 6701a70-6701a76 888->889 890 6701a68-6701a6e 888->890 893 6701a80 889->893 890->893 894 6701aba-6701acd 891->894 893->891 897 6701ad2-6701adf 894->897 898 6701ae1 897->898 899 6701ae5-6701b0e 897->899 898->899 902 6701c40-6701c47 899->902 903 6701b14-6701b40 899->903 909 6701c4d-6701d4c 902->909 910 6701d4f-6701db0 902->910 914 6701b42 903->914 915 6701b47-6701b82 903->915 906 6701052-6701058 904->906 907 670105a-6701060 904->907 908 6701072-6701124 905->908 912 670106a 906->912 907->912 929 6701126-6701132 908->929 930 670114e 908->930 909->910 910->871 912->908 914->915 915->902 931 6701134-670113a 929->931 932 670113c-6701142 929->932 934 6701154-670116f 930->934 935 670114c 931->935 932->935 938 6701171-670117d 934->938 939 6701199 934->939 935->934 942 6701187-670118d 938->942 943 670117f-6701185 938->943 940 670119f-67011bd 939->940 947 67011c3-67012c2 940->947 948 67012db-67013bf 940->948 945 6701197 942->945 943->945 945->940 947->948 962 67013c1-67013cd 948->962 963 67013e9 948->963 965 67013d7-67013dd 962->965 966 67013cf-67013d5 962->966 967 67013ef-6701444 963->967 969 67013e7 965->969 966->969 974 6701562-6701638 967->974 975 670144a-6701549 967->975 969->967 974->868 984 670163e-6701647 974->984 975->974 986 6701652-6701751 984->986 987 6701649-670164c 984->987 988 670176a-6701781 986->988 987->986 987->988 988->868 993 6701787-6701898 988->993 1010 67018a3-67019a2 993->1010 1011 670189a-670189d 993->1011 1010->868 1011->868 1011->1010
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HERE$HERE$HERE$HERE$HERE$HERE$HERE$LOOK$LOOK$LOOK$LOOK$LOOK$LOOK$LOOK$p<]q$p<]q$p<]q$p<]q$Guq$Guq$Guq$Guq$Guq
                                          • API String ID: 0-3029792773
                                          • Opcode ID: 9950b32f66dddb1028e7be346421e3735782f1dab559e1d8a3f17b11128977bf
                                          • Instruction ID: b3531a55ede554d06e499ed1793770fc1791c2da136df3bd67c0cd663ecab605
                                          • Opcode Fuzzy Hash: 9950b32f66dddb1028e7be346421e3735782f1dab559e1d8a3f17b11128977bf
                                          • Instruction Fuzzy Hash: AC828174E402298FDBA4DF68C994B99B7F1AF88310F5481E9D40DAB365DB30AE85CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1440 6e11b6c0-6e11b715 GetModuleHandleW 1441 6e11b717-6e11b724 LoadLibraryW 1440->1441 1442 6e11b72a-6e11b738 GetProcAddress 1440->1442 1441->1442 1443 6e11b94c-6e11b954 1441->1443 1442->1443 1444 6e11b73e-6e11b750 1442->1444 1445 6e11b956-6e11b95b 1443->1445 1446 6e11b95e-6e11b96a 1443->1446 1444->1443 1451 6e11b756-6e11b771 1444->1451 1445->1446 1447 6e11b974-6e11b98f call 6e16948b 1446->1447 1448 6e11b96c-6e11b971 1446->1448 1448->1447 1451->1443 1454 6e11b777-6e11b788 1451->1454 1454->1443 1456 6e11b78e-6e11b791 1454->1456 1456->1443 1457 6e11b797-6e11b7b2 1456->1457 1457->1443 1459 6e11b7b8-6e11b7c5 1457->1459 1459->1443 1461 6e11b7cb-6e11b7d0 1459->1461 1462 6e11b7d2-6e11b7d7 1461->1462 1463 6e11b7da-6e11b7e7 1461->1463 1462->1463 1464 6e11b7ec-6e11b7ee 1463->1464 1464->1443 1465 6e11b7f4-6e11b7f9 1464->1465 1466 6e11b805-6e11b80a 1465->1466 1467 6e11b7fb-6e11b800 call 6e17c1e0 1465->1467 1469 6e11b814-6e11b829 1466->1469 1470 6e11b80c-6e11b811 1466->1470 1467->1466 1469->1443 1472 6e11b82f-6e11b849 1469->1472 1470->1469 1473 6e11b850-6e11b85b 1472->1473 1473->1473 1474 6e11b85d-6e11b8a4 call 6e16a116 GetModuleHandleW 1473->1474 1474->1443 1477 6e11b8aa-6e11b8c1 1474->1477 1478 6e11b8c5-6e11b8d0 1477->1478 1478->1478 1479 6e11b8d2-6e11b8f0 GetProcAddress 1478->1479 1479->1443 1480 6e11b8f2-6e11b8ff call 6e105340 1479->1480 1484 6e11b900-6e11b905 1480->1484 1484->1484 1485 6e11b907-6e11b90d 1484->1485 1485->1484 1486 6e11b90f-6e11b912 1485->1486 1487 6e11b914-6e11b929 1486->1487 1488 6e11b93a 1486->1488 1489 6e11b931-6e11b938 1487->1489 1490 6e11b92b-6e11b92e 1487->1490 1491 6e11b93d-6e11b948 call 6e11ad80 1488->1491 1489->1491 1490->1489 1491->1443
                                          APIs
                                          • GetModuleHandleW.KERNEL32(mscoree.dll,4F740BFF), ref: 6E11B711
                                          • LoadLibraryW.KERNEL32(mscoree.dll), ref: 6E11B71C
                                          • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 6E11B730
                                          • __cftoe.LIBCMT ref: 6E11B870
                                          • GetModuleHandleW.KERNEL32(?), ref: 6E11B88B
                                          • GetProcAddress.KERNEL32(00000000,C8F5E518), ref: 6E11B8D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc$LibraryLoad__cftoe
                                          • String ID: CLRCreateInstance$mscoree.dll$v4.0.30319
                                          • API String ID: 1275574042-506955582
                                          • Opcode ID: 0672f819f573c2a65418d23aa33161188fd5055b6eb055096a6f59c5aa6865f1
                                          • Instruction ID: c27667335c96cbf870186b99ddab18b0576153d6adf7b0893193ad7b7621f9d2
                                          • Opcode Fuzzy Hash: 0672f819f573c2a65418d23aa33161188fd5055b6eb055096a6f59c5aa6865f1
                                          • Instruction Fuzzy Hash: 539168B1908249DFCB04DFE8C8849EEBBB4BF49310B20856CE116AB354D734A986DB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o]q$(o]q$,aq$,aq$Haq
                                          • API String ID: 0-2157538030
                                          • Opcode ID: 1ed00c354e173a7123997674ea623cd610cbb77537179b6e646195055655ae53
                                          • Instruction ID: 7d6eca5b14e1019e83ac9aa6f5d629cc84818dbe796e7a6ad9862086449b979d
                                          • Opcode Fuzzy Hash: 1ed00c354e173a7123997674ea623cd610cbb77537179b6e646195055655ae53
                                          • Instruction Fuzzy Hash: 88627F75B001169FCB18DF69C884AAEB7B6FF88311B15816AE845DF364DB30EC41CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xaq$$]q
                                          • API String ID: 0-1280934391
                                          • Opcode ID: 8491c1248dd3c9d350312aca42439f08987276b23838cbcccbe257f750c275d2
                                          • Instruction ID: 1fb76c8d02bc3f9af6b5f9e9a95c6f9ca5b42a9475fb56abbb92e242e895b82d
                                          • Opcode Fuzzy Hash: 8491c1248dd3c9d350312aca42439f08987276b23838cbcccbe257f750c275d2
                                          • Instruction Fuzzy Hash: A3817434B042189BCB18DF75945467EBBB7BFC8750F09886EE416EB388CE359802C796
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: da13d86ac1e7fae68c13908713ddebb217e0aa02f392d4a97b0c2c6a0c5a0b1f
                                          • Instruction ID: e80a41effd37d21d8965ba44e22518723305f4e4355c6c6e8deb7400896a3038
                                          • Opcode Fuzzy Hash: da13d86ac1e7fae68c13908713ddebb217e0aa02f392d4a97b0c2c6a0c5a0b1f
                                          • Instruction Fuzzy Hash: C1329174E012289FDB64DFA5C894BEDBBB2BF89300F1091AAD519B7294DB305E81CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d284d7c2800d6d7445162910a32afdb530cd53733d3dfcfaf5ee4201cdf481c
                                          • Instruction ID: 8628c7a8d339b40066480b4fb7b8b594b1b5cee0fd389f201d323df2c26ac614
                                          • Opcode Fuzzy Hash: 5d284d7c2800d6d7445162910a32afdb530cd53733d3dfcfaf5ee4201cdf481c
                                          • Instruction Fuzzy Hash: 64129E74E04228CFDB64DF69C994B9DBBB2BF89300F1081AAD409AB365DB705E85CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e2a640a84db7a81a678a87dca1f36d779d5987f5e62943b186e721b3a1efdf64
                                          • Instruction ID: 639a12d935257cd11968292b26172207afc4df1d251e03293c2c13438757cfcd
                                          • Opcode Fuzzy Hash: e2a640a84db7a81a678a87dca1f36d779d5987f5e62943b186e721b3a1efdf64
                                          • Instruction Fuzzy Hash: 3B91D474E012189FDB64DF69C850BDDBBF2BF89300F1481AAD508AB251DB305A85CF91
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E1284BF
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E1284D2
                                          • SafeArrayGetElement.OLEAUT32 ref: 6E12850A
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E1294C1
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E1294D4
                                          • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E12950C
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E1297A4
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E1297B7
                                          • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E1297F2
                                            • Part of subcall function 6E123A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E123B71
                                            • Part of subcall function 6E123A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E123B83
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E129D5F
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E129D72
                                          • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E129DAF
                                            • Part of subcall function 6E123A90: SafeArrayDestroy.OLEAUT32(?), ref: 6E123BCF
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E12A1BC
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E12A1CF
                                          • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E12A20C
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Bound$Destroy$Element
                                          • String ID: A
                                          • API String ID: 959723449-3554254475
                                          • Opcode ID: f53d6218070f9813027f334e114b9eea8137e665f3da4e0a6aabe6a7c843472e
                                          • Instruction ID: 6f5c01cc36c68c24e8e7e08809e95ca59f2062b5c96d53e3532884ffb555e394
                                          • Opcode Fuzzy Hash: f53d6218070f9813027f334e114b9eea8137e665f3da4e0a6aabe6a7c843472e
                                          • Instruction Fuzzy Hash: 47237D70A002059FDB40DFE8CC94FDA77B9AF49304F1485A8EA09AF296DB71E9C5DB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1021 6e122970-6e1229c1 1022 6e1229c3-6e1229c8 call 6e17c1e0 1021->1022 1023 6e1229cd-6e1229d7 1021->1023 1022->1023 1087 6e1229d8 call 190d148 1023->1087 1088 6e1229d8 call 190d149 1023->1088 1025 6e1229da-6e1229dc 1026 6e122d12-6e122d18 1025->1026 1027 6e1229e2-6e1229e8 1025->1027 1028 6e122d21-6e122d37 1026->1028 1030 6e122d1a-6e122d1b SafeArrayDestroy 1026->1030 1027->1028 1029 6e1229ee-6e122a1a SafeArrayGetLBound SafeArrayGetUBound 1027->1029 1029->1026 1031 6e122a20-6e122a37 SafeArrayGetElement 1029->1031 1030->1028 1031->1026 1032 6e122a3d-6e122a4d 1031->1032 1032->1022 1033 6e122a53-6e122a6f 1032->1033 1035 6e122a75-6e122a77 1033->1035 1036 6e122d5a-6e122d5f 1033->1036 1035->1036 1037 6e122a7d-6e122a92 call 6e1238e0 1035->1037 1038 6e122c76-6e122c78 1036->1038 1042 6e122c58-6e122c63 1037->1042 1043 6e122a98-6e122aac 1037->1043 1038->1026 1039 6e122c7e-6e122c86 1038->1039 1039->1026 1047 6e122c65-6e122c6a 1042->1047 1048 6e122c6d-6e122c72 1042->1048 1045 6e122ab6-6e122acc VariantInit 1043->1045 1046 6e122aae-6e122ab3 1043->1046 1045->1022 1049 6e122ad2-6e122ae3 1045->1049 1046->1045 1047->1048 1048->1038 1050 6e122ae5-6e122ae7 1049->1050 1051 6e122ae9-6e122aeb 1049->1051 1052 6e122aee-6e122af2 1050->1052 1051->1052 1053 6e122af4-6e122af6 1052->1053 1054 6e122af8 1052->1054 1055 6e122afa-6e122b34 1053->1055 1054->1055 1057 6e122b3a-6e122b50 VariantInit 1055->1057 1058 6e122c8b-6e122caa VariantClear * 2 1055->1058 1057->1022 1059 6e122b56-6e122b67 1057->1059 1058->1048 1060 6e122cac-6e122cb4 1058->1060 1061 6e122b69-6e122b6b 1059->1061 1062 6e122b6d-6e122b6f 1059->1062 1060->1048 1063 6e122b72-6e122b76 1061->1063 1062->1063 1065 6e122b78-6e122b7a 1063->1065 1066 6e122b7c 1063->1066 1067 6e122b7e-6e122bb8 1065->1067 1066->1067 1069 6e122d3a-6e122d55 VariantClear * 3 1067->1069 1070 6e122bbe-6e122bcb 1067->1070 1069->1042 1070->1069 1071 6e122bd1-6e122bf3 call 6e133160 1070->1071 1075 6e122cb6-6e122cf1 VariantClear * 3 1071->1075 1076 6e122bf9-6e122c1f VariantClear * 3 1071->1076 1083 6e122cf3-6e122cf6 1075->1083 1084 6e122cfb-6e122d06 1075->1084 1077 6e122c21-6e122c26 1076->1077 1078 6e122c29-6e122c34 1076->1078 1077->1078 1079 6e122c36-6e122c3b 1078->1079 1080 6e122c3e-6e122c4d 1078->1080 1079->1080 1080->1031 1082 6e122c53 1080->1082 1082->1026 1083->1084 1085 6e122d10 1084->1085 1086 6e122d08-6e122d0d 1084->1086 1085->1026 1086->1085 1087->1025 1088->1025
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E1229F6
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E122A08
                                          • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E122A2F
                                          • VariantInit.OLEAUT32(?), ref: 6E122ABB
                                          • VariantInit.OLEAUT32(?), ref: 6E122B3F
                                          • VariantClear.OLEAUT32(?), ref: 6E122C04
                                          • VariantClear.OLEAUT32(?), ref: 6E122C0B
                                          • VariantClear.OLEAUT32(?), ref: 6E122C12
                                          • VariantClear.OLEAUT32(?), ref: 6E122C96
                                          • VariantClear.OLEAUT32(?), ref: 6E122C9D
                                          • VariantClear.OLEAUT32(?), ref: 6E122CD6
                                          • VariantClear.OLEAUT32(?), ref: 6E122CDD
                                          • VariantClear.OLEAUT32(?), ref: 6E122CE4
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E122D1B
                                          • VariantClear.OLEAUT32(?), ref: 6E122D45
                                          • VariantClear.OLEAUT32(?), ref: 6E122D4C
                                          • VariantClear.OLEAUT32(?), ref: 6E122D53
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArraySafe$BoundInit$DestroyElement
                                          • String ID:
                                          • API String ID: 214056513-0
                                          • Opcode ID: 665d61ddae9b22d63180e4045ef3717aadbccf526a67fffd04c08f9a36ee7ea5
                                          • Instruction ID: b7c616a3eb23b5b7153d6a3e1e5ceee8406aed884ee94c96e519526c096d05a0
                                          • Opcode Fuzzy Hash: 665d61ddae9b22d63180e4045ef3717aadbccf526a67fffd04c08f9a36ee7ea5
                                          • Instruction Fuzzy Hash: B1C178712183459FD700CFA8C884A5FBBE8BF99304F20896DF695CB260D775E885DB62

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1089 6e11af30-6e11af95 VariantInit * 3 1090 6e11afa1-6e11afa7 1089->1090 1091 6e11af97-6e11af9c call 6e17c1e0 1089->1091 1093 6e11afb1-6e11afbf 1090->1093 1094 6e11afa9-6e11afae 1090->1094 1091->1090 1168 6e11afc0 call 190d148 1093->1168 1169 6e11afc0 call 190d149 1093->1169 1094->1093 1095 6e11afc2-6e11afc4 1096 6e11afca-6e11afda call 6e1238e0 1095->1096 1097 6e11b22c-6e11b252 VariantClear * 3 1095->1097 1096->1097 1104 6e11afe0-6e11aff4 1096->1104 1099 6e11b254-6e11b257 1097->1099 1100 6e11b25c-6e11b26a 1097->1100 1099->1100 1102 6e11b274-6e11b288 1100->1102 1103 6e11b26c-6e11b271 1100->1103 1103->1102 1105 6e11aff6-6e11aff9 1104->1105 1106 6e11affe-6e11b015 VariantCopy 1104->1106 1105->1106 1107 6e11b017-6e11b018 call 6e17c1e0 1106->1107 1108 6e11b01d-6e11b033 VariantClear 1106->1108 1107->1108 1110 6e11b035-6e11b03a call 6e17c1e0 1108->1110 1111 6e11b03f-6e11b050 1108->1111 1110->1111 1113 6e11b052-6e11b054 1111->1113 1114 6e11b056-6e11b058 1111->1114 1115 6e11b05b-6e11b05f 1113->1115 1114->1115 1116 6e11b061-6e11b063 1115->1116 1117 6e11b065 1115->1117 1118 6e11b067-6e11b09a 1116->1118 1117->1118 1170 6e11b09d call 190d148 1118->1170 1171 6e11b09d call 190d149 1118->1171 1119 6e11b09f-6e11b0a1 1119->1097 1120 6e11b0a7-6e11b0b3 call 6e169bb5 1119->1120 1123 6e11b0c1 1120->1123 1124 6e11b0b5-6e11b0bf 1120->1124 1125 6e11b0c3-6e11b0ca 1123->1125 1124->1125 1126 6e11b0d0-6e11b0d9 1125->1126 1126->1126 1127 6e11b0db-6e11b111 call 6e1691e1 call 6e16a136 1126->1127 1132 6e11b113-6e11b118 call 6e17c1e0 1127->1132 1133 6e11b11d-6e11b12b 1127->1133 1132->1133 1135 6e11b131-6e11b133 1133->1135 1136 6e11b12d-6e11b12f 1133->1136 1137 6e11b136-6e11b13a 1135->1137 1136->1137 1138 6e11b140 1137->1138 1139 6e11b13c-6e11b13e 1137->1139 1140 6e11b142-6e11b17e 1138->1140 1139->1140 1142 6e11b180-6e11b18a 1140->1142 1143 6e11b1ff-6e11b203 1140->1143 1146 6e11b190-6e11b1b9 SafeArrayGetLBound SafeArrayGetUBound 1142->1146 1147 6e11b28d-6e11b2b8 VariantClear * 3 1142->1147 1144 6e11b210-6e11b215 1143->1144 1145 6e11b205-6e11b20e call 6e169c35 1143->1145 1153 6e11b223-6e11b229 call 6e169b35 1144->1153 1154 6e11b217-6e11b220 call 6e169c35 1144->1154 1145->1144 1148 6e11b28b 1146->1148 1149 6e11b1bf-6e11b1cd SafeArrayAccessData 1146->1149 1151 6e11b2c2-6e11b2d0 1147->1151 1152 6e11b2ba-6e11b2bf 1147->1152 1148->1147 1149->1148 1156 6e11b1d3-6e11b1f7 call 6e1691e1 call 6e16a530 SafeArrayUnaccessData 1149->1156 1159 6e11b2d2-6e11b2d7 1151->1159 1160 6e11b2da-6e11b2ee 1151->1160 1152->1151 1153->1097 1154->1153 1156->1148 1167 6e11b1fd 1156->1167 1159->1160 1167->1143 1168->1095 1169->1095 1170->1119 1171->1119
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E11AF75
                                          • VariantInit.OLEAUT32(?), ref: 6E11AF7C
                                          • VariantInit.OLEAUT32(?), ref: 6E11AF83
                                          • VariantCopy.OLEAUT32(?,?), ref: 6E11B00D
                                          • VariantClear.OLEAUT32(?), ref: 6E11B027
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E11B19C
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E11B1AA
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 6E11B1C5
                                          • _memmove.LIBCMT ref: 6E11B1E6
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 6E11B1EF
                                          • VariantClear.OLEAUT32(?), ref: 6E11B237
                                          • VariantClear.OLEAUT32(?), ref: 6E11B23E
                                          • VariantClear.OLEAUT32(?), ref: 6E11B245
                                          • VariantClear.OLEAUT32(?), ref: 6E11B29D
                                          • VariantClear.OLEAUT32(?), ref: 6E11B2A4
                                          • VariantClear.OLEAUT32(?), ref: 6E11B2AB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArraySafe$Init$BoundData$AccessCopyUnaccess_memmove
                                          • String ID:
                                          • API String ID: 3403836469-0
                                          • Opcode ID: e9ec96621ba8eb00d11499a7d7d8478a1e0bbc186a870f0ba4a7dcb03de9a5a2
                                          • Instruction ID: e250049c124caf017f5a5826a86f20ab9d47badc1716cf0e22667bf3be542e67
                                          • Opcode Fuzzy Hash: e9ec96621ba8eb00d11499a7d7d8478a1e0bbc186a870f0ba4a7dcb03de9a5a2
                                          • Instruction Fuzzy Hash: 23C158B26083429FD700DFA8C884D9BB7E9FB89304F10896DF659CB254D730E985DB92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1172 6e12d410-6e12d44c 1173 6e12d472-6e12d4e0 VariantInit * 3 1172->1173 1174 6e12d44e-6e12d465 1172->1174 1175 6e12d4e2-6e12d4ea 1173->1175 1176 6e12d4ec-6e12d4f2 1173->1176 1177 6e12d4f6-6e12d504 1175->1177 1176->1177 1178 6e12d506-6e12d50d 1177->1178 1179 6e12d51e-6e12d527 1177->1179 1180 6e12d514-6e12d516 1178->1180 1181 6e12d50f-6e12d512 1178->1181 1182 6e12d538-6e12d53c 1179->1182 1183 6e12d529-6e12d530 1179->1183 1186 6e12d518-6e12d51c 1180->1186 1181->1186 1185 6e12d540-6e12d544 1182->1185 1183->1182 1184 6e12d532-6e12d536 1183->1184 1184->1185 1187 6e12d704-6e12d72f VariantClear * 3 1185->1187 1188 6e12d54a-6e12d5c0 call 6e169d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1185->1188 1186->1178 1186->1179 1190 6e12d731-6e12d757 1187->1190 1191 6e12d76c-6e12d783 1187->1191 1196 6e12d5c2-6e12d5c4 1188->1196 1197 6e12d5c6-6e12d5ea call 6e16a530 SafeArrayUnaccessData 1188->1197 1193 6e12d470 1190->1193 1194 6e12d75d 1190->1194 1193->1173 1198 6e12d5ec-6e12d605 SafeArrayPutElement 1196->1198 1197->1198 1201 6e12d6e5-6e12d6eb 1198->1201 1202 6e12d60b-6e12d629 1198->1202 1205 6e12d6f6-6e12d6f8 1201->1205 1206 6e12d6ed-6e12d6f3 call 6e169d2c 1201->1206 1203 6e12d633-6e12d64f SafeArrayPutElement VariantClear 1202->1203 1204 6e12d62b-6e12d630 1202->1204 1203->1201 1208 6e12d655-6e12d664 1203->1208 1204->1203 1209 6e12d701 1205->1209 1210 6e12d6fa-6e12d6fb SafeArrayDestroy 1205->1210 1206->1205 1212 6e12d762-6e12d767 call 6e17c1e0 1208->1212 1213 6e12d66a-6e12d694 1208->1213 1209->1187 1210->1209 1212->1191 1225 6e12d697 call 190d148 1213->1225 1226 6e12d697 call 190d149 1213->1226 1215 6e12d699-6e12d69b 1215->1201 1216 6e12d69d-6e12d6a9 1215->1216 1216->1201 1217 6e12d6ab-6e12d6c1 call 6e11db30 1216->1217 1217->1201 1220 6e12d6c3-6e12d6e0 call 6e1256b0 call 6e126880 1217->1220 1220->1201 1225->1215 1226->1215
                                          APIs
                                          • VariantInit.OLEAUT32 ref: 6E12D4B3
                                          • VariantInit.OLEAUT32 ref: 6E12D4C5
                                          • VariantInit.OLEAUT32(?), ref: 6E12D4CC
                                          • _malloc.LIBCMT ref: 6E12D551
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E12D58B
                                          • SafeArrayCreateVector.OLEAUT32 ref: 6E12D5A6
                                          • SafeArrayAccessData.OLEAUT32 ref: 6E12D5B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayInitSafeVariant$CreateVector$AccessData_malloc
                                          • String ID:
                                          • API String ID: 1552365394-0
                                          • Opcode ID: 5b4b73994a2e81229615e927413aa71e61b31d0f0bed4af84cfeecd9840fda42
                                          • Instruction ID: 43b4fac0973fc1f7bd932af5e00eab17b1fcdc91083ad619df556e895cd97f34
                                          • Opcode Fuzzy Hash: 5b4b73994a2e81229615e927413aa71e61b31d0f0bed4af84cfeecd9840fda42
                                          • Instruction Fuzzy Hash: 8FB154B66083419FD314CF68C880A5BB7F9FF89314F14896DE8958B250EB70E985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1227 6e12d468 1228 6e12d470-6e12d4e0 VariantInit * 3 1227->1228 1230 6e12d4e2-6e12d4ea 1228->1230 1231 6e12d4ec-6e12d4f2 1228->1231 1232 6e12d4f6-6e12d504 1230->1232 1231->1232 1233 6e12d506-6e12d50d 1232->1233 1234 6e12d51e-6e12d527 1232->1234 1235 6e12d514-6e12d516 1233->1235 1236 6e12d50f-6e12d512 1233->1236 1237 6e12d538-6e12d53c 1234->1237 1238 6e12d529-6e12d530 1234->1238 1241 6e12d518-6e12d51c 1235->1241 1236->1241 1240 6e12d540-6e12d544 1237->1240 1238->1237 1239 6e12d532-6e12d536 1238->1239 1239->1240 1242 6e12d704-6e12d72f VariantClear * 3 1240->1242 1243 6e12d54a-6e12d5c0 call 6e169d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1240->1243 1241->1233 1241->1234 1245 6e12d731-6e12d757 1242->1245 1246 6e12d76c-6e12d783 1242->1246 1250 6e12d5c2-6e12d5c4 1243->1250 1251 6e12d5c6-6e12d5ea call 6e16a530 SafeArrayUnaccessData 1243->1251 1245->1228 1248 6e12d75d 1245->1248 1252 6e12d5ec-6e12d605 SafeArrayPutElement 1250->1252 1251->1252 1255 6e12d6e5-6e12d6eb 1252->1255 1256 6e12d60b-6e12d629 1252->1256 1259 6e12d6f6-6e12d6f8 1255->1259 1260 6e12d6ed-6e12d6f3 call 6e169d2c 1255->1260 1257 6e12d633-6e12d64f SafeArrayPutElement VariantClear 1256->1257 1258 6e12d62b-6e12d630 1256->1258 1257->1255 1262 6e12d655-6e12d664 1257->1262 1258->1257 1263 6e12d701 1259->1263 1264 6e12d6fa-6e12d6fb SafeArrayDestroy 1259->1264 1260->1259 1266 6e12d762-6e12d767 call 6e17c1e0 1262->1266 1267 6e12d66a-6e12d694 1262->1267 1263->1242 1264->1263 1266->1246 1279 6e12d697 call 190d148 1267->1279 1280 6e12d697 call 190d149 1267->1280 1269 6e12d699-6e12d69b 1269->1255 1270 6e12d69d-6e12d6a9 1269->1270 1270->1255 1271 6e12d6ab-6e12d6c1 call 6e11db30 1270->1271 1271->1255 1274 6e12d6c3-6e12d6e0 call 6e1256b0 call 6e126880 1271->1274 1274->1255 1279->1269 1280->1269
                                          APIs
                                          • VariantInit.OLEAUT32 ref: 6E12D4B3
                                          • VariantInit.OLEAUT32 ref: 6E12D4C5
                                          • VariantInit.OLEAUT32(?), ref: 6E12D4CC
                                          • _malloc.LIBCMT ref: 6E12D551
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E12D58B
                                          • SafeArrayCreateVector.OLEAUT32 ref: 6E12D5A6
                                          • SafeArrayAccessData.OLEAUT32 ref: 6E12D5B8
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12D601
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12D63E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$InitVariant$CreateElementVector$AccessData_malloc
                                          • String ID:
                                          • API String ID: 2723946344-0
                                          • Opcode ID: ad288f1ca2b98adfa0caf5d76aaf514067dd09e2bd1bcac03463ea389c0f513c
                                          • Instruction ID: 2df57cf74e0c91fb2da9971fdbc371c40bccda65067d924f814f1058f0e74d79
                                          • Opcode Fuzzy Hash: ad288f1ca2b98adfa0caf5d76aaf514067dd09e2bd1bcac03463ea389c0f513c
                                          • Instruction Fuzzy Hash: 669155B56083419FD304CFA8C880A5BB7F9BF89308F14896DE8958B251E774E885CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1281 6e1244c0-6e124538 VariantInit * 2 SafeArrayCreateVector 1282 6e124542-6e124564 SafeArrayPutElement VariantClear 1281->1282 1283 6e12453a-6e12453d 1281->1283 1284 6e12456a-6e124598 SafeArrayCreateVector SafeArrayPutElement 1282->1284 1285 6e12476f-6e124774 1282->1285 1283->1282 1284->1285 1286 6e12459e-6e1245b9 SafeArrayPutElement 1284->1286 1287 6e124776-6e124777 SafeArrayDestroy 1285->1287 1288 6e12477d-6e12479b VariantClear * 2 1285->1288 1286->1285 1289 6e1245bf-6e1245d2 SafeArrayPutElement 1286->1289 1287->1288 1290 6e1247b0-6e1247c4 1288->1290 1291 6e12479d-6e1247ad 1288->1291 1289->1285 1292 6e1245d8-6e1245e3 1289->1292 1291->1290 1293 6e1245e5-6e1245ea call 6e17c1e0 1292->1293 1294 6e1245ef-6e124604 1292->1294 1293->1294 1294->1285 1297 6e12460a-6e124615 1294->1297 1297->1285 1298 6e12461b-6e12469f 1297->1298 1305 6e1246a1-6e12471f 1298->1305 1311 6e124721-6e124758 1305->1311 1314 6e12475a call 6e16919e 1311->1314 1315 6e12475f-6e12476a call 6e12de60 1311->1315 1314->1315 1317 6e12476c 1315->1317 1317->1285
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E1244FF
                                          • VariantInit.OLEAUT32(?), ref: 6E124505
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E124516
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E124551
                                          • VariantClear.OLEAUT32(?), ref: 6E12455A
                                          • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6E124579
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E124594
                                          • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 6E1245B5
                                          • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 6E1245CE
                                          • std::tr1::_Xweak.LIBCPMT ref: 6E12475A
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E124777
                                          • VariantClear.OLEAUT32(?), ref: 6E124787
                                          • VariantClear.OLEAUT32(?), ref: 6E12478D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$DestroyXweakstd::tr1::_
                                          • String ID:
                                          • API String ID: 1304965753-0
                                          • Opcode ID: 7a968b2a64ab4c6eec75956295fda8a76e825d243b3d33cf467f112fc2b196fd
                                          • Instruction ID: 524e338f2b43057df5df409788094029b6e143a37b750cc4febc9f7e0682441f
                                          • Opcode Fuzzy Hash: 7a968b2a64ab4c6eec75956295fda8a76e825d243b3d33cf467f112fc2b196fd
                                          • Instruction Fuzzy Hash: F3A12B75A002069FDB54DBE4CD84EAFB7B9BF8D710F144629E506AB780CA34F981DB60

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1319 6e12bf00-6e12bf6a VariantInit * 4 1320 6e12bf74-6e12bf86 1319->1320 1321 6e12bf6c-6e12bf71 1319->1321 1322 6e12bf90-6e12bfbb call 6e12c150 1320->1322 1323 6e12bf88-6e12bf8d 1320->1323 1321->1320 1326 6e12bfc1-6e12bfdf call 6e12c150 1322->1326 1327 6e12c0c4-6e12c0cd 1322->1327 1323->1322 1326->1327 1334 6e12bfe5-6e12c019 call 6e12dc40 1326->1334 1328 6e12c0e2-6e12c149 call 6e16a1f7 * 2 VariantClear * 4 call 6e16948b 1327->1328 1329 6e12c0cf-6e12c0df 1327->1329 1329->1328 1340 6e12c020-6e12c029 1334->1340 1341 6e12c01b-6e12c01e 1334->1341 1342 6e12c02b-6e12c02c 1340->1342 1343 6e12c02e 1340->1343 1345 6e12c035-6e12c037 call 6e1244c0 1341->1345 1346 6e12c030-6e12c032 1342->1346 1343->1346 1348 6e12c03c-6e12c03e 1345->1348 1346->1345 1348->1327 1350 6e12c044-6e12c05c VariantInit VariantCopy 1348->1350 1351 6e12c064-6e12c07a 1350->1351 1352 6e12c05e-6e12c05f call 6e17c1e0 1350->1352 1351->1327 1355 6e12c07c-6e12c094 VariantInit VariantCopy 1351->1355 1352->1351 1356 6e12c096-6e12c097 call 6e17c1e0 1355->1356 1357 6e12c09c-6e12c0af 1355->1357 1356->1357 1357->1327 1360 6e12c0b1-6e12c0c0 1357->1360 1360->1327
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Init$Clear$Copy
                                          • String ID:
                                          • API String ID: 3833040332-0
                                          • Opcode ID: 6f4978002b5586272e308795dc788de5aa721ca9cba4e96e6b27f7207a5244d7
                                          • Instruction ID: 9af7b7fa0a4072585c5f1c5539c9c41f0a70913c535d0071488941e031c8b679
                                          • Opcode Fuzzy Hash: 6f4978002b5586272e308795dc788de5aa721ca9cba4e96e6b27f7207a5244d7
                                          • Instruction Fuzzy Hash: 7D818A71900219AFDB04DFE8CC84FEEBBB9BF49304F148569E505AB240DB30EA85DB94

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1361 6e1264d0-6e126552 VariantInit * 3 SafeArrayCreateVector 1362 6e126554-6e126559 1361->1362 1363 6e12655c-6e12657e SafeArrayPutElement VariantClear 1361->1363 1362->1363 1364 6e126661-6e126663 1363->1364 1365 6e126584-6e1265a1 1363->1365 1368 6e126665-6e126666 SafeArrayDestroy 1364->1368 1369 6e12666c-6e12669d VariantClear * 3 1364->1369 1366 6e1265a3-6e1265a6 1365->1366 1367 6e1265ab-6e1265c7 SafeArrayPutElement VariantClear 1365->1367 1366->1367 1367->1364 1370 6e1265cd-6e1265db 1367->1370 1368->1369 1371 6e1265e7-6e126613 1370->1371 1372 6e1265dd-6e1265e2 call 6e17c1e0 1370->1372 1384 6e126616 call 190d148 1371->1384 1385 6e126616 call 190d149 1371->1385 1372->1371 1374 6e126618-6e12661a 1374->1364 1375 6e12661c-6e126628 1374->1375 1375->1364 1376 6e12662a-6e12663c call 6e11db30 1375->1376 1376->1364 1379 6e12663e-6e126650 call 6e1256b0 call 6e126880 1376->1379 1383 6e126655-6e12665c 1379->1383 1383->1364 1384->1374 1385->1374
                                          APIs
                                          • VariantInit.OLEAUT32 ref: 6E12650C
                                          • VariantInit.OLEAUT32(?), ref: 6E126519
                                          • VariantInit.OLEAUT32(?), ref: 6E126520
                                          • SafeArrayCreateVector.OLEAUT32(0000000C), ref: 6E126531
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12656D
                                          • VariantClear.OLEAUT32(?), ref: 6E126576
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E1265B6
                                          • VariantClear.OLEAUT32(?), ref: 6E1265BF
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E126666
                                          • VariantClear.OLEAUT32(?), ref: 6E126677
                                          • VariantClear.OLEAUT32(?), ref: 6E12667E
                                          • VariantClear.OLEAUT32(?), ref: 6E126685
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                          • String ID:
                                          • API String ID: 1625659656-0
                                          • Opcode ID: 46b218e25b1a69ef6bc8724a04110724a13a51bda593e0b68b66ff55e724b89b
                                          • Instruction ID: b4c7a0e7718803097342238313c4076dc4c77f791d7d8fadc0f6f72506093a74
                                          • Opcode Fuzzy Hash: 46b218e25b1a69ef6bc8724a04110724a13a51bda593e0b68b66ff55e724b89b
                                          • Instruction Fuzzy Hash: 4A515CB25187059FC700DF64C880A5BBBF8EFDA700F10892DF96587250EB35E946DB92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1386 6e12cb90-6e12cc11 VariantInit * 2 SafeArrayCreateVector * 2 SafeArrayPutElement 1387 6e12cce7-6e12cce9 1386->1387 1388 6e12cc17-6e12cc4b SafeArrayPutElement VariantClear 1386->1388 1389 6e12ccf2-6e12cd18 VariantClear * 2 1387->1389 1390 6e12cceb-6e12ccec SafeArrayDestroy 1387->1390 1388->1387 1391 6e12cc51-6e12cc61 SafeArrayPutElement 1388->1391 1390->1389 1391->1387 1392 6e12cc67-6e12cc7b SafeArrayPutElement 1391->1392 1392->1387 1393 6e12cc7d-6e12cc8e 1392->1393 1394 6e12cc90-6e12cc95 call 6e17c1e0 1393->1394 1395 6e12cc9a-6e12ccc8 1393->1395 1394->1395 1400 6e12ccc9 call 190d148 1395->1400 1401 6e12ccc9 call 190d149 1395->1401 1397 6e12cccb-6e12cccd 1397->1387 1398 6e12cccf-6e12cce1 1397->1398 1398->1387 1399 6e12cce3 1398->1399 1399->1387 1400->1397 1401->1397
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12CBCA
                                          • VariantInit.OLEAUT32(?), ref: 6E12CBD3
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E12CBE4
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E12CBF6
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12CC0D
                                          • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6E12CC39
                                          • VariantClear.OLEAUT32(?), ref: 6E12CC42
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6E12CC5D
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6E12CC77
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E12CCEC
                                          • VariantClear.OLEAUT32(?), ref: 6E12CCFC
                                          • VariantClear.OLEAUT32(?), ref: 6E12CD02
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$Destroy
                                          • String ID:
                                          • API String ID: 3548156019-0
                                          • Opcode ID: b51ab3c68d0ea855814b3bf337dbf75ab714a8673dea531c82afb28344fb5b05
                                          • Instruction ID: d90ee01d3722eaebdbf70d349273210448695b7d4c0dacec3648a4c58ab47f70
                                          • Opcode Fuzzy Hash: b51ab3c68d0ea855814b3bf337dbf75ab714a8673dea531c82afb28344fb5b05
                                          • Instruction Fuzzy Hash: D9511DB5D0024A9FDB00DFA4CC84EEEBBB8FF49710F14816AEA15A7241D770A945DBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1402 6e11a350-6e11a3bd VariantInit * 3 call 6e1238e0 1405 6e11a3c3-6e11a3d6 1402->1405 1406 6e11a505-6e11a528 VariantClear * 3 1402->1406 1409 6e11a3e0-6e11a3f7 VariantCopy 1405->1409 1410 6e11a3d8-6e11a3dd 1405->1410 1407 6e11a532-6e11a546 1406->1407 1408 6e11a52a-6e11a52d 1406->1408 1408->1407 1411 6e11a3f9-6e11a3fa call 6e17c1e0 1409->1411 1412 6e11a3ff-6e11a411 VariantClear 1409->1412 1410->1409 1411->1412 1414 6e11a413-6e11a418 call 6e17c1e0 1412->1414 1415 6e11a41d-6e11a42b 1412->1415 1414->1415 1417 6e11a431-6e11a433 1415->1417 1418 6e11a42d-6e11a42f 1415->1418 1419 6e11a436-6e11a43a 1417->1419 1418->1419 1420 6e11a440 1419->1420 1421 6e11a43c-6e11a43e 1419->1421 1422 6e11a442-6e11a477 1420->1422 1421->1422 1438 6e11a47a call 190d148 1422->1438 1439 6e11a47a call 190d149 1422->1439 1423 6e11a47c-6e11a47e 1423->1406 1424 6e11a484-6e11a493 1423->1424 1425 6e11a495-6e11a49a call 6e17c1e0 1424->1425 1426 6e11a49f-6e11a4b0 1424->1426 1425->1426 1428 6e11a4b2-6e11a4b4 1426->1428 1429 6e11a4b6-6e11a4b8 1426->1429 1430 6e11a4bb-6e11a4bf 1428->1430 1429->1430 1431 6e11a4c1-6e11a4c3 1430->1431 1432 6e11a4c5 1430->1432 1433 6e11a4c7-6e11a503 1431->1433 1432->1433 1433->1406 1435 6e11a549-6e11a578 VariantClear * 3 1433->1435 1436 6e11a582-6e11a596 1435->1436 1437 6e11a57a-6e11a57f 1435->1437 1437->1436 1438->1423 1439->1423
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$Init$Copy
                                          • String ID:
                                          • API String ID: 3214764494-0
                                          • Opcode ID: 6ad7d9b1dde71ba8ec801f8fcfb5705f84e221520e7a2cd4f2616310100adbcf
                                          • Instruction ID: 461a5ddae762fa8a07331ca4db4fb6796c4c9c365c02aa5b7ecfde919a611643
                                          • Opcode Fuzzy Hash: 6ad7d9b1dde71ba8ec801f8fcfb5705f84e221520e7a2cd4f2616310100adbcf
                                          • Instruction Fuzzy Hash: FA715B726083419FD300DFA9C880A9BBBE8FF89710F14896DFA55CB290D730E945DB62

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1494 6e12cd20-6e12cd97 VariantInit * 3 SafeArrayCreateVector 1495 6e12cda1-6e12cdc0 SafeArrayPutElement VariantClear 1494->1495 1496 6e12cd99-6e12cd9c 1494->1496 1497 6e12d2a0-6e12d2a2 1495->1497 1498 6e12cdc6-6e12cdd1 1495->1498 1496->1495 1501 6e12d2a4-6e12d2a5 SafeArrayDestroy 1497->1501 1502 6e12d2ab-6e12d2d7 VariantClear * 3 1497->1502 1499 6e12cdd3-6e12cdd8 call 6e17c1e0 1498->1499 1500 6e12cddd-6e12cdef 1498->1500 1499->1500 1500->1497 1505 6e12cdf5-6e12ce01 1500->1505 1501->1502 1505->1497 1506 6e12ce07-6e12cea4 1505->1506 1514 6e12cea6-6e12ceb7 1506->1514 1515 6e12ceba-6e12cf2b 1506->1515 1514->1515 1521 6e12cf41-6e12d222 1515->1521 1522 6e12cf2d-6e12cf3e 1515->1522 1557 6e12d224-6e12d229 call 6e17c1e0 1521->1557 1558 6e12d22e-6e12d25c 1521->1558 1522->1521 1557->1558 1561 6e12d25e-6e12d269 1558->1561 1562 6e12d29d 1558->1562 1561->1562 1563 6e12d26b-6e12d27b call 6e11db30 1561->1563 1562->1497 1563->1562 1566 6e12d27d-6e12d28d call 6e1256b0 call 6e126880 1563->1566 1570 6e12d292-6e12d299 1566->1570 1570->1562
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12CD5C
                                          • VariantInit.OLEAUT32(?), ref: 6E12CD65
                                          • VariantInit.OLEAUT32(?), ref: 6E12CD6B
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12CD76
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12CDAA
                                          • VariantClear.OLEAUT32(?), ref: 6E12CDB7
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E12D2A5
                                          • VariantClear.OLEAUT32(?), ref: 6E12D2B5
                                          • VariantClear.OLEAUT32(?), ref: 6E12D2BB
                                          • VariantClear.OLEAUT32(?), ref: 6E12D2C1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 2515392200-0
                                          • Opcode ID: 7f67330ffb2b27953dec573991864b5f526c4c2b7bff712cbefe182f0cf9efc6
                                          • Instruction ID: 7d0119726e8e3b03542743b7faeb960df2bde535f1c68f81424893dd9f5fed6b
                                          • Opcode Fuzzy Hash: 7f67330ffb2b27953dec573991864b5f526c4c2b7bff712cbefe182f0cf9efc6
                                          • Instruction Fuzzy Hash: EF12F575615705AFC758DBD8DD84DAAB3B9BF8D300F144668F50AABB91CA30F841CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1571 6e1266a0-6e126725 VariantInit * 2 SafeArrayCreateVector 1572 6e126727-6e12672a 1571->1572 1573 6e12672f-6e12674f SafeArrayPutElement VariantClear 1571->1573 1572->1573 1574 6e126844-6e126846 1573->1574 1575 6e126755-6e126772 1573->1575 1578 6e126848-6e126849 SafeArrayDestroy 1574->1578 1579 6e12684f-6e126878 VariantClear * 2 1574->1579 1576 6e126774-6e126779 1575->1576 1577 6e12677c-6e12679c SafeArrayPutElement VariantClear 1575->1577 1576->1577 1577->1574 1580 6e1267a2-6e1267b0 1577->1580 1578->1579 1581 6e1267b2-6e1267b7 call 6e17c1e0 1580->1581 1582 6e1267bc-6e1267ef 1580->1582 1581->1582 1594 6e1267f2 call 190d148 1582->1594 1595 6e1267f2 call 190d149 1582->1595 1584 6e1267f4-6e1267f6 1584->1574 1585 6e1267f8-6e126805 1584->1585 1585->1574 1586 6e126807-6e12681c call 6e11db30 1585->1586 1586->1574 1589 6e12681e-6e12683f call 6e1256b0 call 6e126880 1586->1589 1589->1574 1594->1584 1595->1584
                                          APIs
                                          • VariantInit.OLEAUT32 ref: 6E1266DB
                                          • VariantInit.OLEAUT32 ref: 6E1266EA
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E126700
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12673A
                                          • VariantClear.OLEAUT32(?), ref: 6E126747
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E126787
                                          • VariantClear.OLEAUT32(?), ref: 6E126794
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E126849
                                          • VariantClear.OLEAUT32(?), ref: 6E12685A
                                          • VariantClear.OLEAUT32(?), ref: 6E126861
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$ElementInit$CreateDestroyVector
                                          • String ID:
                                          • API String ID: 551789342-0
                                          • Opcode ID: f7ac39995a74838cf05777a1b4b257e14d37d23753d83833d208f3745550c506
                                          • Instruction ID: 2c30d8d1b409b02b44c7026a527aa721c89034227b5a46cb27fbc73550163442
                                          • Opcode Fuzzy Hash: f7ac39995a74838cf05777a1b4b257e14d37d23753d83833d208f3745550c506
                                          • Instruction Fuzzy Hash: 4E516B761087069FC700CF64C844B9BBBE9EF89714F108A6DF9559B250EB30E945DBA2

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1596 6e12840e-6e128413 call 6e17c1e0 1598 6e128418-6e12841f 1596->1598 1686 6e128422 call 190d148 1598->1686 1687 6e128422 call 190d149 1598->1687 1599 6e128424-6e128426 1600 6e12ae53-6e12ae60 1599->1600 1601 6e12842c-6e128443 call 6e11dfb0 1599->1601 1602 6e12ae62-6e12ae65 SafeArrayDestroy 1600->1602 1603 6e12ae68-6e12ae70 1600->1603 1601->1600 1610 6e128449-6e128454 1601->1610 1602->1603 1605 6e12ae72-6e12ae75 SafeArrayDestroy 1603->1605 1606 6e12ae7b-6e12ae83 1603->1606 1605->1606 1608 6e12ae85-6e12ae88 SafeArrayDestroy 1606->1608 1609 6e12ae8e-6e12ae96 1606->1609 1608->1609 1611 6e12aea1-6e12aea9 1609->1611 1612 6e12ae98-6e12ae9b SafeArrayDestroy 1609->1612 1613 6e128456-6e128461 1610->1613 1614 6e128464-6e12846f 1610->1614 1617 6e12aeb4-6e12aebc 1611->1617 1618 6e12aeab-6e12aeae SafeArrayDestroy 1611->1618 1612->1611 1613->1614 1615 6e128471-6e12847c 1614->1615 1616 6e12847f-6e128487 1614->1616 1615->1616 1619 6e128493-6e1284a9 1616->1619 1620 6e128489-6e12848e call 6e17c1e0 1616->1620 1621 6e12aec7-6e12aed3 1617->1621 1622 6e12aebe-6e12aec1 SafeArrayDestroy 1617->1622 1618->1617 1619->1600 1629 6e1284af-6e1284e7 SafeArrayGetLBound SafeArrayGetUBound 1619->1629 1620->1619 1624 6e12aed5-6e12aeda 1621->1624 1625 6e12aedd-6e12aef8 call 6e16948b 1621->1625 1622->1621 1624->1625 1630 6e128616-6e12862d call 6e11dfb0 1629->1630 1631 6e1284ed-6e128512 SafeArrayGetElement 1629->1631 1630->1600 1639 6e128633-6e12864d call 6e11dfb0 1630->1639 1633 6e128758-6e128761 1631->1633 1634 6e128518-6e128523 1631->1634 1633->1600 1635 6e128767-6e12876f 1633->1635 1637 6e128525-6e128528 1634->1637 1638 6e12852d-6e12853b 1634->1638 1635->1600 1637->1638 1640 6e128545-6e12855a 1638->1640 1641 6e12853d-6e128542 1638->1641 1639->1600 1649 6e128653-6e12866d call 6e11dfb0 1639->1649 1642 6e128564-6e128582 call 6e123a90 1640->1642 1643 6e12855c-6e128561 1640->1643 1641->1640 1650 6e128584-6e12858d 1642->1650 1651 6e12858f-6e1285ab call 6e123a90 1642->1651 1643->1642 1649->1600 1658 6e128673-6e12868c call 6e11dfb0 1649->1658 1653 6e1285b6-6e1285b9 call 6e11ad80 1650->1653 1660 6e1285be-6e1285f6 call 6e16a1f7 * 2 1651->1660 1661 6e1285ad-6e1285b0 1651->1661 1653->1660 1658->1600 1665 6e128692-6e1286ac call 6e11dfb0 1658->1665 1670 6e128600-6e128610 1660->1670 1671 6e1285f8-6e1285fd 1660->1671 1661->1653 1665->1600 1672 6e1286b2-6e1286d1 call 6e1269c0 1665->1672 1670->1630 1670->1631 1671->1670 1672->1600 1675 6e1286d7-6e1286f7 call 6e1269c0 1672->1675 1675->1600 1678 6e1286fd-6e12870b 1675->1678 1679 6e128715-6e128753 call 6e1269c0 call 6e16a1f7 1678->1679 1680 6e12870d-6e128712 1678->1680 1679->1600 1680->1679 1686->1599 1687->1599
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E1284BF
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E1284D2
                                          • SafeArrayGetElement.OLEAUT32 ref: 6E12850A
                                            • Part of subcall function 6E123A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E123B71
                                            • Part of subcall function 6E123A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E123B83
                                            • Part of subcall function 6E1269C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E126A08
                                            • Part of subcall function 6E1269C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E126A15
                                            • Part of subcall function 6E1269C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E126A41
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                            • Part of subcall function 6E11DFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E11DFF6
                                            • Part of subcall function 6E11DFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E11E003
                                            • Part of subcall function 6E11DFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E11E02F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Bound$Destroy$Element
                                          • String ID:
                                          • API String ID: 959723449-0
                                          • Opcode ID: 7d2e614608e21682d1e2b15266d387a02510df6359df3019fd16fe9e9c7c7319
                                          • Instruction ID: 7818df1bd73be8d331376d7e2019222d5e3bc02343f8a75913a4e8408e4d3e6e
                                          • Opcode Fuzzy Hash: 7d2e614608e21682d1e2b15266d387a02510df6359df3019fd16fe9e9c7c7319
                                          • Instruction Fuzzy Hash: 58C15F70A002059FDB50DFA8CC94FAAB7B9AF55304F2085A8E519EB286DB71EDC1DB50
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E1241AF
                                          • VariantInit.OLEAUT32(?), ref: 6E1241B5
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E1241C0
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E1241F5
                                          • VariantClear.OLEAUT32(?), ref: 6E124201
                                          • std::tr1::_Xweak.LIBCPMT ref: 6E124450
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12446D
                                          • VariantClear.OLEAUT32(?), ref: 6E12447D
                                          • VariantClear.OLEAUT32(?), ref: 6E124483
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                          • String ID:
                                          • API String ID: 1774866819-0
                                          • Opcode ID: 57937520256c5cc601195c8c47ee4b43718f9e02ed3bbb09176bcf44bc4e50ea
                                          • Instruction ID: 84c538ccda805c3356898725e0e13fd099556aae74da60c2530db599f39353db
                                          • Opcode Fuzzy Hash: 57937520256c5cc601195c8c47ee4b43718f9e02ed3bbb09176bcf44bc4e50ea
                                          • Instruction Fuzzy Hash: 3BB12675A006499FCB14DF98CC84DEAB7F9BF8D310F158568E50AAB790DA34F841DB60
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12C56F
                                          • VariantInit.OLEAUT32(?), ref: 6E12C575
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12C580
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E12C5B5
                                          • VariantClear.OLEAUT32(?), ref: 6E12C5C1
                                          • std::tr1::_Xweak.LIBCPMT ref: 6E12C7D4
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12C7F1
                                          • VariantClear.OLEAUT32(?), ref: 6E12C801
                                          • VariantClear.OLEAUT32(?), ref: 6E12C807
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                          • String ID:
                                          • API String ID: 1774866819-0
                                          • Opcode ID: 74994db025a3235f1e6eb4e09d3fbb904095eafdbd62937ad1c5d66fc9beb9b9
                                          • Instruction ID: 724e11966b1eb7c8d8aed54e353c5a8524d2ac242cae5c29621428eb36e8e76a
                                          • Opcode Fuzzy Hash: 74994db025a3235f1e6eb4e09d3fbb904095eafdbd62937ad1c5d66fc9beb9b9
                                          • Instruction Fuzzy Hash: 16A139756006099FCB14DF98CC84DEAB7F9BF8D310F158568E606AB790DA34F881DB60
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E1268B2
                                          • VariantInit.OLEAUT32(?), ref: 6E1268BD
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E1268D7
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E1268FD
                                          • VariantClear.OLEAUT32(?), ref: 6E126909
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E126923
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E126981
                                          • VariantClear.OLEAUT32(?), ref: 6E12699E
                                          • VariantClear.OLEAUT32(?), ref: 6E1269A4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArraySafe$Clear$ElementInit$CreateDestroyVector
                                          • String ID:
                                          • API String ID: 3529038988-0
                                          • Opcode ID: d2607c2f1f41255fac6eb7fa72e9ec90572de78e398a604250805a60b8104663
                                          • Instruction ID: 6a4f03470a8de1ee1c37884285184b04aedcb9677a2d577ac90eebc8a2da85b1
                                          • Opcode Fuzzy Hash: d2607c2f1f41255fac6eb7fa72e9ec90572de78e398a604250805a60b8104663
                                          • Instruction Fuzzy Hash: F04161B2900609DFDB00DFA4C884AEFBBB8FF59710F148129E505A7340EB75A945DBA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID:
                                          • API String ID: 2610073882-0
                                          • Opcode ID: 905788289e362075715ab2dea6f048a86231d4263f953ba01a20f128841dd9cb
                                          • Instruction ID: 3523c53cdb0229364970cc1709810dfd8a7ec4d611e81e48a0a2af497293ac14
                                          • Opcode Fuzzy Hash: 905788289e362075715ab2dea6f048a86231d4263f953ba01a20f128841dd9cb
                                          • Instruction Fuzzy Hash: E0C156716087019FC304CFA8C88099BB7E9BFD9704F248A6DF5989B364D735E885DB92
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6E126C8B
                                          • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6E126CA6
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6E126CC7
                                            • Part of subcall function 6E125760: std::tr1::_Xweak.LIBCPMT ref: 6E125769
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E126CF9
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E126F13
                                          • InterlockedCompareExchange.KERNEL32(6E1AC6A4,45524548,4B4F4F4C), ref: 6E126F34
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                          • String ID:
                                          • API String ID: 2722669376-0
                                          • Opcode ID: 1d495dce0598ae44624deba568cc192321806f151114f8033b009eb229c14bd9
                                          • Instruction ID: a05ac6075116a6c1066ce5c85ab35ed60c45ff39acc8c3c6496a4869a4ce26ae
                                          • Opcode Fuzzy Hash: 1d495dce0598ae44624deba568cc192321806f151114f8033b009eb229c14bd9
                                          • Instruction Fuzzy Hash: DBD1A2B1A102099FDB10CFE4CC90BEE77B9AF45304F158879E515AB284D774E9C4EBA1
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::tr1::_Xweak.LIBCPMT ref: 6E111B53
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E111B5D
                                          • std::exception::exception.LIBCMT ref: 6E111C43
                                          • __CxxThrowException@8.LIBCMT ref: 6E111C58
                                          Strings
                                          • invalid vector<T> subscript, xrefs: 6E111B58
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8ThrowXinvalid_argumentXweak_mallocstd::_std::exception::exceptionstd::tr1::_
                                          • String ID: invalid vector<T> subscript
                                          • API String ID: 3098024973-3016609489
                                          • Opcode ID: 9bf9f93b39f5acdb0ba42bbbf116127c07d57fe323e3ef2483291b599f459cd8
                                          • Instruction ID: da59a4aba784027d23dca87511a2aa9ba2fa9a17c77e072bc812ea2a6d8a59af
                                          • Opcode Fuzzy Hash: 9bf9f93b39f5acdb0ba42bbbf116127c07d57fe323e3ef2483291b599f459cd8
                                          • Instruction Fuzzy Hash: 802228759007499FCB10CFE4C4909EEFBF9BF44314F118A6ED55AAB250E734AA89DB80
                                          APIs
                                          • VariantInit.OLEAUT32(6E1231EC), ref: 6E11DB5E
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E11DB6E
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E11DB82
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E11DBF1
                                          • VariantClear.OLEAUT32(?), ref: 6E11DBFB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Variant$ClearCreateDestroyElementInitVector
                                          • String ID:
                                          • API String ID: 182531043-0
                                          • Opcode ID: 73c840c8d336e2314e8f7d7b089f42258ab95fcde3113ac032b68fe60c2aa12f
                                          • Instruction ID: 215828adab6649fd4e8b7606fb882ff7149a5f7348d3de386a8fab8896d5cc18
                                          • Opcode Fuzzy Hash: 73c840c8d336e2314e8f7d7b089f42258ab95fcde3113ac032b68fe60c2aa12f
                                          • Instruction Fuzzy Hash: CA318F7AA04605AFDB00DF94C844EEFB7B9FF9A710F11816AE911AB300D734A801DFA0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: T@12
                                          • String ID: a0
                                          • API String ID: 456891419-3188653782
                                          • Opcode ID: 6dc1def6d48eefc55a34149cb8e0165c141f15dd1cf743c96dc8b35f72bc5ced
                                          • Instruction ID: a691c295afa25765a289dadeaa543d9f65d67d38ba28ba34e9665c6f268d12ca
                                          • Opcode Fuzzy Hash: 6dc1def6d48eefc55a34149cb8e0165c141f15dd1cf743c96dc8b35f72bc5ced
                                          • Instruction Fuzzy Hash: 0911DA70D002776ADB709AF64C5CFAFBBBCAF92754F148418E921E2144D734C9D1EAA0
                                          APIs
                                          • _malloc.LIBCMT ref: 6E169BCF
                                            • Part of subcall function 6E169D66: __FF_MSGBANNER.LIBCMT ref: 6E169D7F
                                            • Part of subcall function 6E169D66: __NMSG_WRITE.LIBCMT ref: 6E169D86
                                            • Part of subcall function 6E169D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E169DAB
                                          • std::exception::exception.LIBCMT ref: 6E169C04
                                          • std::exception::exception.LIBCMT ref: 6E169C1E
                                          • __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                          • String ID:
                                          • API String ID: 615853336-0
                                          • Opcode ID: a6ba91484d0553d69692cc411305559e837caec9b61eb65d27cbb4f31f0f7864
                                          • Instruction ID: c467563137a29d682a85477e18c89030085a419b2d675e904c23c48a1acee1d5
                                          • Opcode Fuzzy Hash: a6ba91484d0553d69692cc411305559e837caec9b61eb65d27cbb4f31f0f7864
                                          • Instruction Fuzzy Hash: CFF0F47140055DABDF14DBD8CC34EEE7BBCBB41718F140819D402A6284DB708AD1B750
                                          APIs
                                          • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 6E116C73
                                          • SafeArrayAccessData.OLEAUT32(00000000,6E116C3C), ref: 6E116C87
                                          • _memmove.LIBCMT ref: 6E116C9A
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E116CA3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Data$AccessCreateUnaccessVector_memmove
                                          • String ID:
                                          • API String ID: 3147195435-0
                                          • Opcode ID: 4b047db69f3c31a58973dd5743f56759eb3f9481e16a6fab59a0ff0dd6fa7d94
                                          • Instruction ID: 5c271763a72d099f05c6a61b6f00901c80b531c6e4bb188c024fef0de1df91fc
                                          • Opcode Fuzzy Hash: 4b047db69f3c31a58973dd5743f56759eb3f9481e16a6fab59a0ff0dd6fa7d94
                                          • Instruction Fuzzy Hash: 78F05E75214219BBEB109F91DC89FDB3BACEF86764F00C025FA188A240E771E540ABA1
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E132206
                                          • __CxxThrowException@8.LIBCMT ref: 6E132221
                                            • Part of subcall function 6E136480: __CxxThrowException@8.LIBCMT ref: 6E136518
                                            • Part of subcall function 6E136480: __CxxThrowException@8.LIBCMT ref: 6E136558
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$_mallocstd::exception::exception
                                          • String ID: ILProtector
                                          • API String ID: 84431791-1153028812
                                          • Opcode ID: 40714e98458e14a398f8cf7be25370e247ca3a866f37e3a7a9e24c2478f6e42e
                                          • Instruction ID: 96201990efb8d3848168db0eb276a47b51144561ee6ad9a3b4f171315a394121
                                          • Opcode Fuzzy Hash: 40714e98458e14a398f8cf7be25370e247ca3a866f37e3a7a9e24c2478f6e42e
                                          • Instruction Fuzzy Hash: 0F7139B5904658DFCB14CFA8C844BEEBBB8FF49300F10859AD41AA7340DB306A85DF91
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6E11913B
                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6E11915C
                                          • EnterCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 6E119170
                                          • LeaveCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 6E119191
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3168844106-0
                                          • Opcode ID: 6932d7b25cb928c2aa565770106c804dad09e48bd7ce5420d69c32deddae5c29
                                          • Instruction ID: 20e09e8e46e92154f23f059dc5e4aaf06db163bd0a389245e0817bdba20d32fc
                                          • Opcode Fuzzy Hash: 6932d7b25cb928c2aa565770106c804dad09e48bd7ce5420d69c32deddae5c29
                                          • Instruction Fuzzy Hash: C34151769042099FCB04DFD5C9948EFBBB8FF59210B21856ED926AB300D730AA45DFE1
                                          APIs
                                          • EnterCriticalSection.KERNEL32 ref: 6E118E89
                                          • LeaveCriticalSection.KERNEL32(?,00000000), ref: 6E118EAD
                                          • _memset.LIBCMT ref: 6E118ED2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave_memset
                                          • String ID:
                                          • API String ID: 3751686142-0
                                          • Opcode ID: d050c9049769d48d7555f7b8c878e88b189a90374d4457da43d04c44089e894c
                                          • Instruction ID: 5858c71bfe59c7063aa37d4e7cbfb8021b8019084cf584e4be7d9c6f75842d5e
                                          • Opcode Fuzzy Hash: d050c9049769d48d7555f7b8c878e88b189a90374d4457da43d04c44089e894c
                                          • Instruction Fuzzy Hash: 9C516D74604246AFC744CF98C490EDAB7B6FF49304F20C569E91A9B381D731ED95DB90
                                          APIs
                                          • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6E11D949
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6E11D96C
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E11D9CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 3149346722-0
                                          • Opcode ID: a3be395773bb94174ae3721fb10a8d96af8a2a2d04aea0c9095cd8fb16964e69
                                          • Instruction ID: 090e53de3ca89906b18b69809674cef9c184ea36173519ef58021961f38e5888
                                          • Opcode Fuzzy Hash: a3be395773bb94174ae3721fb10a8d96af8a2a2d04aea0c9095cd8fb16964e69
                                          • Instruction Fuzzy Hash: A121A135200619AFEB11CF94CC94FEB77A8EF8A701F1080A8E945DB244D771ED41EBA1
                                          APIs
                                          • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,?), ref: 6E11DA16
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6E11DA33
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E11DA9E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 3149346722-0
                                          • Opcode ID: b5cc8ae868a6e313efb216aa003a6dd8f95bba7c2851b39ee1f885a5f51895db
                                          • Instruction ID: a9d4acd0e426bed9f7650ec2521863c9154e20b614e79dd5dd587aa3ed3f2787
                                          • Opcode Fuzzy Hash: b5cc8ae868a6e313efb216aa003a6dd8f95bba7c2851b39ee1f885a5f51895db
                                          • Instruction Fuzzy Hash: 09214A75208606AFE700CFE9D890BDB77A8AF5A301F204469EA05CB240E771E941EF60
                                          APIs
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12DB2D
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E12DB45
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E12DBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 3149346722-0
                                          • Opcode ID: 6448e0675e2f725e8eded47d23deb2089de05a554899fae3cf42ba7375dad709
                                          • Instruction ID: d3765c9175df8ddeb432cd60cb506761332346212fe8f83e592af08d934a0ff7
                                          • Opcode Fuzzy Hash: 6448e0675e2f725e8eded47d23deb2089de05a554899fae3cf42ba7375dad709
                                          • Instruction Fuzzy Hash: D3119A75641205AFD700DFA9C898F9ABBB8FF5A311F0481A9E908DB301D731A881DFA0
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E134042
                                            • Part of subcall function 6E169533: std::exception::_Copy_str.LIBCMT ref: 6E16954E
                                          • __CxxThrowException@8.LIBCMT ref: 6E134059
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$Copy_strExceptionRaise_mallocstd::exception::_
                                          • String ID:
                                          • API String ID: 2813683038-0
                                          • Opcode ID: bf1c29191a0cdc4c418768af82b3b3fcfa2fe8ce2c590cb07ae514c437b3e4bb
                                          • Instruction ID: 969f882dd87679bd0b0b46391c3ad6167742a23e3af43f90df26313d6cbaf8d9
                                          • Opcode Fuzzy Hash: bf1c29191a0cdc4c418768af82b3b3fcfa2fe8ce2c590cb07ae514c437b3e4bb
                                          • Instruction Fuzzy Hash: 6D91DFB19087009FD700CFD9C840B9EFBF8FF90344F25896AE5159B290E7B1D985AB96
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E11BE2D
                                          • IsBadReadPtr.KERNEL32(00000000,00000008,?,?,?), ref: 6E11BE6D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroyReadSafe
                                          • String ID:
                                          • API String ID: 616443815-0
                                          • Opcode ID: cc316f5071bec0c6a2444fec674f7c9612f1e0c02de2ffc9251ae699837aab77
                                          • Instruction ID: 72068c8e0748bc003b772b8a0a2d96f1ad3e262c2bb4293e25e7862bc7ed59e4
                                          • Opcode Fuzzy Hash: cc316f5071bec0c6a2444fec674f7c9612f1e0c02de2ffc9251ae699837aab77
                                          • Instruction Fuzzy Hash: 6B71E27090C6979EDB51CFB88850AD9BBB1AB1A220F24836CD9A5973DDC331D4C2DB50
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E116466
                                            • Part of subcall function 6E169533: std::exception::_Copy_str.LIBCMT ref: 6E16954E
                                          • __CxxThrowException@8.LIBCMT ref: 6E11647D
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Copy_strExceptionException@8RaiseThrow_mallocstd::exception::_std::exception::exception
                                          • String ID:
                                          • API String ID: 2299493649-0
                                          • Opcode ID: 9cbb6caa7ee9afa8c644edb7b888fe86e67f3204e06eb7c89f6c2db496f5a4a1
                                          • Instruction ID: f2e915e04489a69c48e1e1f0ca308ef56572221aefa6cef6f5a7bbcd1d5577c3
                                          • Opcode Fuzzy Hash: 9cbb6caa7ee9afa8c644edb7b888fe86e67f3204e06eb7c89f6c2db496f5a4a1
                                          • Instruction Fuzzy Hash: 17518AB19183409FD300CF98C881A8ABBE8BB85740F50493EF9598B390E771D984EB92
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E12D3E8
                                          • __CxxThrowException@8.LIBCMT ref: 6E12D3FF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw_mallocstd::exception::exception
                                          • String ID:
                                          • API String ID: 4063778783-0
                                          • Opcode ID: 7902df4a38b25ca9b17f76d6881e9d3528eb8b0aa4950a665f1ca573b82bfc50
                                          • Instruction ID: 278110123ae1efb4b01c6a1163969d9d7c025ad0bc7712ef254fc001dd31134a
                                          • Opcode Fuzzy Hash: 7902df4a38b25ca9b17f76d6881e9d3528eb8b0aa4950a665f1ca573b82bfc50
                                          • Instruction Fuzzy Hash: AF313BB55087059FC704CF68C88099ABBF4FF89714F608A2EF4558B350E731E986DB92
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E118449
                                          • __CxxThrowException@8.LIBCMT ref: 6E11845E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw_mallocstd::exception::exception
                                          • String ID:
                                          • API String ID: 4063778783-0
                                          • Opcode ID: c226b1d741735eda67df9337cbd68016c3e951e5976305721624dbf2f6812a43
                                          • Instruction ID: d64189bb6f801d5e3825e6a162bf0c624a3e7432dbaea1ecd0b58b30acb4de97
                                          • Opcode Fuzzy Hash: c226b1d741735eda67df9337cbd68016c3e951e5976305721624dbf2f6812a43
                                          • Instruction Fuzzy Hash: E50144755042089FC708DF94D4A0CDABBB5EF54300B50C5ADDD1A4B750EB30EA95DB95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TJbq$Te]q
                                          • API String ID: 0-3147309840
                                          • Opcode ID: 87d560497a034d877a779c5aeed269a0a366e830132fed08674bb0f54438e8f1
                                          • Instruction ID: 265e62dfaa79a9aa48c09da1ed79228dead6e270bef925edba941aeb7e6fca42
                                          • Opcode Fuzzy Hash: 87d560497a034d877a779c5aeed269a0a366e830132fed08674bb0f54438e8f1
                                          • Instruction Fuzzy Hash: 7931D471A192914FC706AFB4886976E7FF2AF86210F0904DAC445DB3E2D9249D09C7A2
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,?,00000000,6E118C13,?,6E118CD3,?,6E118C13,00000000,?,?,6E118C13,?,?), ref: 6E118D73
                                          • LeaveCriticalSection.KERNEL32(?,?,?,6E118CD3,?,6E118C13,00000000,?,?,6E118C13,?,?), ref: 6E118D8C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3168844106-0
                                          • Opcode ID: 5e69d6d8d9e9366bdc8533420aa10ccae2524f820cddb1200b9c0ab37fdbe72c
                                          • Instruction ID: 65df5ad5cc1256b272e897ea000d0994a59f8cd489ade930d987145ff8b7f715
                                          • Opcode Fuzzy Hash: 5e69d6d8d9e9366bdc8533420aa10ccae2524f820cddb1200b9c0ab37fdbe72c
                                          • Instruction Fuzzy Hash: AE211975204209AF8B04CF89D890DAFB3BAFFC9210B108559F91587340CB30EE16DBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TJbq$Te]q
                                          • API String ID: 0-3147309840
                                          • Opcode ID: 1fa7f434bb3aebf8fdca95210a9f4c76f234d50a640c2cfa1c7919b308c94d02
                                          • Instruction ID: d891f518f5fbd53d95e1134ba44b5d4d656a78c970eab299406e984fad19ec43
                                          • Opcode Fuzzy Hash: 1fa7f434bb3aebf8fdca95210a9f4c76f234d50a640c2cfa1c7919b308c94d02
                                          • Instruction Fuzzy Hash: 4A118170B101155FCB15EBB99494B7FBAF6EBC8610F50486DD50AAB3C0CE21AD058BE6
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,6E116890,?), ref: 6E118BDD
                                          • LeaveCriticalSection.KERNEL32(?), ref: 6E118C23
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3168844106-0
                                          • Opcode ID: 80a26fe84728454389bc3e6997460bb391d0516e79bbc21d20d3241ce56a6080
                                          • Instruction ID: 6964c36b839ebd3494e01c7951dc33bba91695467765aea841a312cb315b6088
                                          • Opcode Fuzzy Hash: 80a26fe84728454389bc3e6997460bb391d0516e79bbc21d20d3241ce56a6080
                                          • Instruction Fuzzy Hash: 08019A71704104AFC740DFA8C88099BF3A8FB992007108669E905C7300DB32EE91D7D5
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05B8C21F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 881bd09ee2f14728be4dc7e0486671335633a821151d3d988edd3bc222345ab1
                                          • Instruction ID: 44a89780a65564923e765220eec6cf64d907df13ef50b0a25e898a4f558b74f0
                                          • Opcode Fuzzy Hash: 881bd09ee2f14728be4dc7e0486671335633a821151d3d988edd3bc222345ab1
                                          • Instruction Fuzzy Hash: 1AB126B0D002198FDB10EFA8C885BEDBBF1FF09304F14A1A9D859AB280D774A985CF55
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05B8C21F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 74e9aa682175e214ef666a37d9c0992a2293f15c7bc09f246bcd5d9430dfbb35
                                          • Instruction ID: 7a00d8b5850f02ae2b0f4f87ebd303b9265fa7408c5720e26f9f383093580082
                                          • Opcode Fuzzy Hash: 74e9aa682175e214ef666a37d9c0992a2293f15c7bc09f246bcd5d9430dfbb35
                                          • Instruction Fuzzy Hash: 5BB126B0D042598FDB10EFA8C885BEDBBF1FF09304F14A1A9D859AB280D774A985CF55
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _malloc
                                          • String ID:
                                          • API String ID: 1579825452-0
                                          • Opcode ID: 45447ed88c68d95a3b145da9d191d5f249fbd69f428b9e7249fc3453b9a525d9
                                          • Instruction ID: a35503dda7b0090849c10da75b42c8b70dd7403fb0210d42a601c315b4860a6d
                                          • Opcode Fuzzy Hash: 45447ed88c68d95a3b145da9d191d5f249fbd69f428b9e7249fc3453b9a525d9
                                          • Instruction Fuzzy Hash: DA819DB19083818FEB21DFF8C891B9EB7E4BB51304F25497DD2598B290D77189C4AB53
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05B8C745
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 9d8e157d22aa417ec21c65b8b52b5113b05cefc157477bc0d87a4a089386fc69
                                          • Instruction ID: de24fffa24987667a3ed498d7eb9cd0780a747a5dc3027234fe2cb03b0701b99
                                          • Opcode Fuzzy Hash: 9d8e157d22aa417ec21c65b8b52b5113b05cefc157477bc0d87a4a089386fc69
                                          • Instruction Fuzzy Hash: A64159B9D002589FCB10DFA9D984AAEFBF5BB49310F14906AE818BB210D375A945CF64
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05B8C745
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 5bb97f1fecaa2947aa73987a24f52de0ab1773ba3a908a85db9d98a0222e9573
                                          • Instruction ID: eea9ab6c368b366963660f5cd7216e1d300d1a1ebf58a333b180b94962ddbb63
                                          • Opcode Fuzzy Hash: 5bb97f1fecaa2947aa73987a24f52de0ab1773ba3a908a85db9d98a0222e9573
                                          • Instruction Fuzzy Hash: 53416AB9D00258DFCB10DFA9D984AEDFBF1BB09310F24946AE818BB210D375A945CF64
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05B8C5FC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: b54ae1301daac6af57bdf630d14b61b483197e7d90cba49063a8fdea67c152d1
                                          • Instruction ID: 7020c333f40aee739849748c5b46274c728269736c29bc7a0ddf77942eec9497
                                          • Opcode Fuzzy Hash: b54ae1301daac6af57bdf630d14b61b483197e7d90cba49063a8fdea67c152d1
                                          • Instruction Fuzzy Hash: 653155B9D012589FCF10DFA9D984A9EFBF5FB19310F10A02AE818BB210D375A945CF64
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05B8C5FC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 280b581bbecbe2fbfd770c678d5a5035a2db65d81217950a247244cc25a9b9ce
                                          • Instruction ID: 761497a0d6b1b9142c23776946db42039234aaede22b0a4f750f70ee7ab49867
                                          • Opcode Fuzzy Hash: 280b581bbecbe2fbfd770c678d5a5035a2db65d81217950a247244cc25a9b9ce
                                          • Instruction Fuzzy Hash: BC4158B9D012589FCF10DFA9D984A9DFBB1FF19310F10A05AE818BB210D375A945CF64
                                          APIs
                                            • Part of subcall function 6E132820: _malloc.LIBCMT ref: 6E132871
                                          • std::tr1::_Xweak.LIBCPMT ref: 6E1171D2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xweak_mallocstd::tr1::_
                                          • String ID:
                                          • API String ID: 4085767713-0
                                          • Opcode ID: 74a0ee6d5fa8f0a9fda13318ca562071a6cc6a4b26b459bcf783ff7d8fa40ffc
                                          • Instruction ID: b8b467f2023b03eff13d92a972927e2a15569ffd0c69509eb074c175367cd228
                                          • Opcode Fuzzy Hash: 74a0ee6d5fa8f0a9fda13318ca562071a6cc6a4b26b459bcf783ff7d8fa40ffc
                                          • Instruction Fuzzy Hash: DE31A2B4A0474A9FCB10CFA9C890AABB7F9FF49204F208A5DE81597780D331E945DB50
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 05B8C4DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 22d50d38a369a712e9f5db393f29fbb87dd6b0440a0558656e287fb3aed42c92
                                          • Instruction ID: 9d04d0b53f434dae15b1b883e69a794088ab4951804a47ec3a9049df49885465
                                          • Opcode Fuzzy Hash: 22d50d38a369a712e9f5db393f29fbb87dd6b0440a0558656e287fb3aed42c92
                                          • Instruction Fuzzy Hash: 4E3189B5D012589FCB10DFA9E584AEEFBF4AB09310F24906AE819B7310D779A944CF64
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 05B8C4DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 91033288d586bdb6f627907618d2fd3b3d388d70e93c814a5c7349728c77dae7
                                          • Instruction ID: 59cccd5367580d55e6aae69d477235db1e7d1b78b402ddf93e1f0199b2ab34e0
                                          • Opcode Fuzzy Hash: 91033288d586bdb6f627907618d2fd3b3d388d70e93c814a5c7349728c77dae7
                                          • Instruction Fuzzy Hash: 75319BB5D012589FCB10DFA9E584AEDFBF0BB09310F24906AE419B7310D779A944CF64
                                          APIs
                                          • ResumeThread.KERNELBASE(?), ref: 05B8C845
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 0f03e55f1e12c1d5fd1e3af8b78f922fc5a1c4194c2876281427117d64a6dde7
                                          • Instruction ID: 4ff7476c67808839ccd154fc850554dd0e755bdbd683b2fbb85a915989bd3601
                                          • Opcode Fuzzy Hash: 0f03e55f1e12c1d5fd1e3af8b78f922fc5a1c4194c2876281427117d64a6dde7
                                          • Instruction Fuzzy Hash: F93187B4D012589FCB14DFA9E984AAEFBF5FB09310F10906AE818B7310D775A941CFA4
                                          APIs
                                          • ResumeThread.KERNELBASE(?), ref: 05B8C845
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 212974290e410d38e7ea92c56191b0bf8c083e99f5e309b68ef4159e38fdc114
                                          • Instruction ID: 743d10e674a7c238bb43a75eb99720853b3f99e04bcab832e8f09dbbcb892dda
                                          • Opcode Fuzzy Hash: 212974290e410d38e7ea92c56191b0bf8c083e99f5e309b68ef4159e38fdc114
                                          • Instruction Fuzzy Hash: FF31ABB8D012189FCB10DFA9D984AADFBF1FB09310F10905AE418B7310D774A945CF64
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • SysAllocString.OLEAUT32 ref: 6E12EA8D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: AllocString_malloc
                                          • String ID:
                                          • API String ID: 959018026-0
                                          • Opcode ID: f9a3719af8348aa454806c7a1ef65b82bb8b1589d05a73e3759202b2bf281778
                                          • Instruction ID: 693855aae7192e1478133cca8c727ed57a357ea78d747eaadd49aa2cb3b918f8
                                          • Opcode Fuzzy Hash: f9a3719af8348aa454806c7a1ef65b82bb8b1589d05a73e3759202b2bf281778
                                          • Instruction Fuzzy Hash: A30184B1904A55EFD711CF94C900B5AB7B8FB05B24F10472AE81597380D7B595809AD0
                                          APIs
                                          • __EH_prolog3_catch.LIBCMT ref: 6E16E8DC
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: H_prolog3_catch_malloc
                                          • String ID:
                                          • API String ID: 529455676-0
                                          • Opcode ID: 66d34c8301e588bbbbc9cf919736f87219375b60dfeff8bb25ff27e5756dbf37
                                          • Instruction ID: 252252303e9042433f117bf5296070e82bf752f6726a35f37d61596a42b5328f
                                          • Opcode Fuzzy Hash: 66d34c8301e588bbbbc9cf919736f87219375b60dfeff8bb25ff27e5756dbf37
                                          • Instruction Fuzzy Hash: 72D0A731514209DBCF41EBD9C405FAE7BB8BB45365FA04465E008BE280DF724FE0A75A
                                          APIs
                                          • ___security_init_cookie.LIBCMT ref: 6E16A510
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ___security_init_cookie
                                          • String ID:
                                          • API String ID: 3657697845-0
                                          • Opcode ID: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                          • Instruction ID: 29a0aeb98ff0dc9359f1b04f8cdc98510438526f24e8c123fe457f43f8d2cebd
                                          • Opcode Fuzzy Hash: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                          • Instruction Fuzzy Hash: 70C09B351443089F8B04CF50F841CDE3719AF54224720D515FC1C067509B3195B1F554
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8aq
                                          • API String ID: 0-538729646
                                          • Opcode ID: 1dca47daca6ae6776090331127fcb1e668153f247e22254d71c778b74a761766
                                          • Instruction ID: 4d9a429c8e2d2aeb0d317bb4543c41dcb6ef9b08f8f4b35fe2a37126f441dc59
                                          • Opcode Fuzzy Hash: 1dca47daca6ae6776090331127fcb1e668153f247e22254d71c778b74a761766
                                          • Instruction Fuzzy Hash: 02410574E06209CFCB14DFA9D4886EEBBF5BF49300F14902AD415BB260DB345985CB5A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Haq
                                          • API String ID: 0-725504367
                                          • Opcode ID: 714a10291c0bbbb79675c9e24abfbcbc7d4471826f265b3caef25011b709cf6d
                                          • Instruction ID: 48370d11b62c488dccf5de4fdee9b94a66d30e3d55ef6d39a9e7f997fcfa4182
                                          • Opcode Fuzzy Hash: 714a10291c0bbbb79675c9e24abfbcbc7d4471826f265b3caef25011b709cf6d
                                          • Instruction Fuzzy Hash: BA21E171A04214AFD7959F68CC55BAE7BBAFF95300F108096E505DB284DA309E06C792
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa2aef025cfb8e7acd74b887c3d969902b1fdfb1feec99a694379a678e664ce3
                                          • Instruction ID: 198aff73c67e2c9aceb6ad929c69f21825dbc22174bb69abcacfad2315d43879
                                          • Opcode Fuzzy Hash: fa2aef025cfb8e7acd74b887c3d969902b1fdfb1feec99a694379a678e664ce3
                                          • Instruction Fuzzy Hash: AC314470D09209CFCB14CFA4D8446EEBBB6FF9A340F10946AC419BB244D7795A8ACF55
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c3ddbaf8e233dd8e45577c3124366886c87a471bb46131ed714e40581efaa31c
                                          • Instruction ID: a47abb8e9da805951a4a25479de626951355ea693dbb3b324b8edcb48ae85f88
                                          • Opcode Fuzzy Hash: c3ddbaf8e233dd8e45577c3124366886c87a471bb46131ed714e40581efaa31c
                                          • Instruction Fuzzy Hash: 2B215E30E042189FDB14DFA9D8946EEBBBAFF88310F14852AD405A7388CF745D45CB66
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 782c81f0953ae55c16378f3c0cc7cc23962af0ade73d2941a058d1e303b027bd
                                          • Instruction ID: 3060421279118e62e95a21c578880b183fa7ae1a3d96af3078a9aba1e3f10951
                                          • Opcode Fuzzy Hash: 782c81f0953ae55c16378f3c0cc7cc23962af0ade73d2941a058d1e303b027bd
                                          • Instruction Fuzzy Hash: 49319774E00219DFDB04DFE9D594A9EBBBAFF88300F108515E919A7365CB34AD06CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103489759.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_192d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8694f6bd645cc3a78d4ea9c68fad7bb099e65b226db0dfad6fec8aa4261f718
                                          • Instruction ID: 167f8454b2f60dee83c32fd62270e2a55f88653c7ef1a6ccd958da0edc66e733
                                          • Opcode Fuzzy Hash: e8694f6bd645cc3a78d4ea9c68fad7bb099e65b226db0dfad6fec8aa4261f718
                                          • Instruction Fuzzy Hash: BC21F575604244DFDB05DF58D980F26BFAAFB84314F248569E90D0B25AC33AD806CBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0bbf5f13d228d0c33c888ba0f9feb8622b67c93451a06ed52e25d8020a12057
                                          • Instruction ID: 5aa3bbe9e46024f92c2a01f80c05be9281928f3e3f1ca09097b5ee3311eab5d6
                                          • Opcode Fuzzy Hash: b0bbf5f13d228d0c33c888ba0f9feb8622b67c93451a06ed52e25d8020a12057
                                          • Instruction Fuzzy Hash: D321D071A10205CFDB54DF68C56466EBBF2AF84310F11C915D422CB399DB30ED42CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103489759.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_192d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 741ec1799d983f143c754da220866df2393e935f8adf4ff74bbbd041eee8ce73
                                          • Instruction ID: 6e6e7c3ac77957ba6fd924c535e49667bc3aa1bc2f6c12d77b1e5f6370fa7443
                                          • Opcode Fuzzy Hash: 741ec1799d983f143c754da220866df2393e935f8adf4ff74bbbd041eee8ce73
                                          • Instruction Fuzzy Hash: 1221D4B1508344DFDB15DFA8D984F26BFA9FB88314F24C969E90D4B25AC33AD406C7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103489759.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_192d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e84ddef4a39471108b203d3124a1600380bfe6504a60ca50a308f44f00311191
                                          • Instruction ID: 792c7aa4ac6ac52390dc8d84bc96b2e626d3ba1938fecbab9bb3cfe117e7afd1
                                          • Opcode Fuzzy Hash: e84ddef4a39471108b203d3124a1600380bfe6504a60ca50a308f44f00311191
                                          • Instruction Fuzzy Hash: AD212371604240EFDB11DF58D5C0F66BFA9FB84714F20C56DD80D0B29AC33AE446C6A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f4bc0e2cefa8a3c63eeaba13ec6f31104587010e65bcd63380769ce798c0a138
                                          • Instruction ID: c49e098a4317417d7194de471c3e14aa8026ca376051d742a0a2f0e6b4c8fa83
                                          • Opcode Fuzzy Hash: f4bc0e2cefa8a3c63eeaba13ec6f31104587010e65bcd63380769ce798c0a138
                                          • Instruction Fuzzy Hash: F421FE74E08219DFCB05CFAAC840AEEBBB5FB49310F00802AE925AB350C7359945CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fcb4c85b3f7d326109d4f2276b9f222860419442bd3c52d0b59b719522ee600
                                          • Instruction ID: 1dbb97051cc151062031a4f96d61af55b6e8fe7426b35c92953f6af16aea0d6d
                                          • Opcode Fuzzy Hash: 2fcb4c85b3f7d326109d4f2276b9f222860419442bd3c52d0b59b719522ee600
                                          • Instruction Fuzzy Hash: 9F115E753092804FC706DB79D898D697FF5EF8A22034645EAE149CB3B2DA259C05CB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a1980c78bdce5d74a71d7c31d7b185f2f2ceb1984364f2d95063ae8ea7bbffbc
                                          • Instruction ID: 3e475a08a121aa666225fdac2f42e143b97a9dd91f8d08a011ca3d0aa3d48f7c
                                          • Opcode Fuzzy Hash: a1980c78bdce5d74a71d7c31d7b185f2f2ceb1984364f2d95063ae8ea7bbffbc
                                          • Instruction Fuzzy Hash: 6A21FE70E4921A8FCB19CFA8C940AEEBBB9BF49300F14862AD415BB355D7749902CF55
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1fb99547d27b2a8ccf7c1ae3480c10645f2a91136316950f4794aef46173fcd7
                                          • Instruction ID: fe1803ef86003626c486b082ed7722c73160ed53f4c05d47fe72060653c9a953
                                          • Opcode Fuzzy Hash: 1fb99547d27b2a8ccf7c1ae3480c10645f2a91136316950f4794aef46173fcd7
                                          • Instruction Fuzzy Hash: 2A11FE70E0921A8FCB18CFA9C9405EEFBF9BF49300F049626D415B7355DB749901CB65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103489759.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_192d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                          • Instruction ID: c7cf3c1bddfb6311486468b22379524b5470e200f1b900c0049eeed965088a9d
                                          • Opcode Fuzzy Hash: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                          • Instruction Fuzzy Hash: 3711D076508280CFDB12CF54D5C4B16BFB2FB84314F24C6A9D9490B65BC33AD41ACBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103489759.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_192d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8f2dc214fb3b67dee6d63525546fcd79b48668cd63b1e3b0b14567c0ac11da0e
                                          • Instruction ID: 4c091affb07159310c8d64760e237c393947d2882730c0358fa790c56271b12f
                                          • Opcode Fuzzy Hash: 8f2dc214fb3b67dee6d63525546fcd79b48668cd63b1e3b0b14567c0ac11da0e
                                          • Instruction Fuzzy Hash: 52110476504380CFDB12CF54D5C4B16BFB1FB84314F24C6A9D9090B656C33AD41ACBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103489759.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_192d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b4c623aaf12d799d01dfa0934b93cccf601b23327cf73bb2393620fe977b88f
                                          • Instruction ID: 4abef44c3f27bd534945dc8d53cfe0850f581d77273312111d70e66bad5058ea
                                          • Opcode Fuzzy Hash: 7b4c623aaf12d799d01dfa0934b93cccf601b23327cf73bb2393620fe977b88f
                                          • Instruction Fuzzy Hash: 9411C175504280DFDB12CF14D5C4B59BFA1FB84325F24C6AAD84D4B65AC33AE44ACBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 435a51928b78bb1f33ccd5140a9674f5b4c64dd02fa02102467ce21474732500
                                          • Instruction ID: b5b81e8f10663d7f83ab4b5a64165d9c97c411b2585d0e2c3d0e2690f729af7a
                                          • Opcode Fuzzy Hash: 435a51928b78bb1f33ccd5140a9674f5b4c64dd02fa02102467ce21474732500
                                          • Instruction Fuzzy Hash: FF0144753101109FC748EB6DD898C2EBBFAFFC962034144A9E10ACB3B1DE22EC018B90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103412582.000000000190D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0190D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_190d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 505ecaf5ae4dad741932d3e3d11084e01bc575049fee9f2c5f42d32a85e9439b
                                          • Instruction ID: 33b4a1e7f417083536ed83f25910e1c0478d111b31920a86a0adced3a1d4ff4b
                                          • Opcode Fuzzy Hash: 505ecaf5ae4dad741932d3e3d11084e01bc575049fee9f2c5f42d32a85e9439b
                                          • Instruction Fuzzy Hash: 1901F7710043049EF76A8AD9CD84B67BFECFF45321F18C92AED0C0A2C6C6799841CA71
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2103412582.000000000190D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0190D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_190d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57c75fa9b60b36c8c02c5226929d992394cd341ad49664aea0aa7558feb60760
                                          • Instruction ID: 4258f962d708ee53a22ab1003a53a39327bd4e3ecc0ec544da33c7712e864fd9
                                          • Opcode Fuzzy Hash: 57c75fa9b60b36c8c02c5226929d992394cd341ad49664aea0aa7558feb60760
                                          • Instruction Fuzzy Hash: A8F06D71405344AEF7268A5ADC84B62FFECEF85635F18C45AEE4C4B2C7C2799844CAB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 77017cf372f053a33a969a4c79227c86b0cb441dcac19a5243c972961087b923
                                          • Instruction ID: 647ebb931068400cd2b772f0d61a7d4aaa3dffb8f996cf3a2edbde8b7521f243
                                          • Opcode Fuzzy Hash: 77017cf372f053a33a969a4c79227c86b0cb441dcac19a5243c972961087b923
                                          • Instruction Fuzzy Hash: ADF0E5B6C0D344CFCB11CFA0C8510E8BF75EDA6251B4541D7D055DF151E235960AC716
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 96e4f85b514d7b2a44a98615d1e400e8aab7421e2f25959ad38fee73140e31bb
                                          • Instruction ID: 89792285863ca36e1db519c4330cef0b2dfbcb6ec9fe6d25f785380baa2a52f4
                                          • Opcode Fuzzy Hash: 96e4f85b514d7b2a44a98615d1e400e8aab7421e2f25959ad38fee73140e31bb
                                          • Instruction Fuzzy Hash: 94E0C974D09208EFCB64DFA8D4049DDBBB9AB49310F0081A6EC1496350D7715A50DF81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58eff30a450b81466595a204984e086d26519f0170fd5e8f46954692f10fb857
                                          • Instruction ID: ea5c1a1c513976de56affbe057fa13b5a19bd5adc00d97c576bc21b79ae0473d
                                          • Opcode Fuzzy Hash: 58eff30a450b81466595a204984e086d26519f0170fd5e8f46954692f10fb857
                                          • Instruction Fuzzy Hash: CFD0C73008C3888FC3269FA098006E97BB49B0B322F080A5BD00A8B4A2C3281009CB12
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: afedad40ed6dc60d4eb3d88937b4144645196e2c95a99840e4f485be25101d73
                                          • Instruction ID: 196a2d52b3fd0737c0cf32dbb261db52e41be3ed074f868bb5200af9f6ff3613
                                          • Opcode Fuzzy Hash: afedad40ed6dc60d4eb3d88937b4144645196e2c95a99840e4f485be25101d73
                                          • Instruction Fuzzy Hash: 03D0A7B094A208DFC720DFA8E5086ADB7FCE70A301F4044A9E818D7304D7715E00DF45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c12387a4f35e024491bc4aa61b1fd63d20f68f106a1cc7086a436f4fbda9890a
                                          • Instruction ID: 493fc6fec9b535f57f79dfce294a0bfe86a26f7d5ad01a6b7b48b76043ce1d9d
                                          • Opcode Fuzzy Hash: c12387a4f35e024491bc4aa61b1fd63d20f68f106a1cc7086a436f4fbda9890a
                                          • Instruction Fuzzy Hash: 6AD05EB085A208DFC760DFA898086A9B7F8E70A301F404495E818C3301D7714A00DB45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 89449a2171c8e4ca8d104a79bd5c076226de6085bfc6e67340a1dc2e0ab68cc0
                                          • Instruction ID: d62095780c30799e49e8b482f3eaec41474cc4d280a572c801700eaa60d16ec3
                                          • Opcode Fuzzy Hash: 89449a2171c8e4ca8d104a79bd5c076226de6085bfc6e67340a1dc2e0ab68cc0
                                          • Instruction Fuzzy Hash: EFD05E3008D3488FC7A6DB98A8156AC7BB49B47321F09596BD4488B463C3698882DB83
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 205e81a023d84565f2d18ac79319505c3a9cb4d3f9a738e38869776f95ed6418
                                          • Instruction ID: 76ae44e2c5ef2a189aab76d16135cf645e02a6d2ec8a08cadbde0678e4b1ac2f
                                          • Opcode Fuzzy Hash: 205e81a023d84565f2d18ac79319505c3a9cb4d3f9a738e38869776f95ed6418
                                          • Instruction Fuzzy Hash: 87D0C93120820C9BDF209EB2D90871ABB99EB01655F08C42AE409C6250DF31D960C655
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2d232c4fa2bea2b2ccce71f694bf4009b452514d4c48fa8f4dfe08e8d6439180
                                          • Instruction ID: 1c38ca263704112c03b233c1629e25a2ebdb53aaf0d3b26451160b71e476ad86
                                          • Opcode Fuzzy Hash: 2d232c4fa2bea2b2ccce71f694bf4009b452514d4c48fa8f4dfe08e8d6439180
                                          • Instruction Fuzzy Hash: DDC08C3000D20C8ED231AFE568087B8B2AC971A30AF840406D41E094118B614018CA6B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b11299ff5235b051f3a0b2d91fc20abb77fc8ee9fc4231e4fb013e4f269eea0e
                                          • Instruction ID: 42fec2be2d3721a21183638f38dd44339f0d8b33765ff8107308b61b9db1ae55
                                          • Opcode Fuzzy Hash: b11299ff5235b051f3a0b2d91fc20abb77fc8ee9fc4231e4fb013e4f269eea0e
                                          • Instruction Fuzzy Hash: 5DD0C97041D2C489D732DEE6B1083657EA86312319F482086F88409A8BC7F65098C766
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 55a1893786c5f3885f7ede4da91e8603ead41cfa8434c7b3dc603b1a3617e3a0
                                          • Instruction ID: 129d8826d276228ccfe33b25d9339fe58d5ea19e17460d857bf42b971c268d49
                                          • Opcode Fuzzy Hash: 55a1893786c5f3885f7ede4da91e8603ead41cfa8434c7b3dc603b1a3617e3a0
                                          • Instruction Fuzzy Hash: 28C02B3000E2048EC972DE84700877072AC9307313F882805D40C01417C760D850DBDB
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E122DFF
                                          • VariantInit.OLEAUT32(?), ref: 6E122E08
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E122E7E
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E122EB5
                                          • VariantClear.OLEAUT32(?), ref: 6E122EC1
                                            • Part of subcall function 6E12C850: VariantInit.OLEAUT32(?), ref: 6E12C88F
                                            • Part of subcall function 6E12C850: VariantInit.OLEAUT32(?), ref: 6E12C895
                                            • Part of subcall function 6E12C850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12C8A0
                                            • Part of subcall function 6E12C850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E12C8D5
                                            • Part of subcall function 6E12C850: VariantClear.OLEAUT32(?), ref: 6E12C8E1
                                          • VariantClear.OLEAUT32(?), ref: 6E1230D5
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E123550
                                          • VariantClear.OLEAUT32(?), ref: 6E123563
                                          • VariantClear.OLEAUT32(?), ref: 6E123569
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                          • String ID:
                                          • API String ID: 2012514194-0
                                          • Opcode ID: 96babaf25461a61e8abf71556b2707609e7b58a84b8a144ce7ac102361e7d05d
                                          • Instruction ID: edf0b123ba49cee944d16dd42cda90732a50531410f2bcdc1c3ea6f2fa749c28
                                          • Opcode Fuzzy Hash: 96babaf25461a61e8abf71556b2707609e7b58a84b8a144ce7ac102361e7d05d
                                          • Instruction Fuzzy Hash: 6B526E71900219DFCB54DFA8C884BDEBBB9FF59700F1485A9E509AB350DB30A986DF90
                                          APIs
                                          • CorBindToRuntimeEx.MSCOREE(v2.0.50727,wks,00000000,6E190634,6E190738,?), ref: 6E11A119
                                          • GetModuleHandleW.KERNEL32(mscorwks), ref: 6E11A145
                                          • __cftoe.LIBCMT ref: 6E11A1FB
                                          • GetModuleHandleW.KERNEL32(?), ref: 6E11A215
                                          • GetProcAddress.KERNEL32(00000000,00000018), ref: 6E11A265
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: HandleModule$AddressBindProcRuntime__cftoe
                                          • String ID: mscorwks$v2.0.50727$wks
                                          • API String ID: 1312202379-2066655427
                                          • Opcode ID: fa97b7801547c88093f2a961a457c831e5456f44cd37570de41d05a69ccd8f3a
                                          • Instruction ID: 4cc8b817624535ba6d031469d4fe67a3299803632e5475442710997438662642
                                          • Opcode Fuzzy Hash: fa97b7801547c88093f2a961a457c831e5456f44cd37570de41d05a69ccd8f3a
                                          • Instruction Fuzzy Hash: E6919E71E082499FDB04CFE8C984ADEBBB5BF49310F20866DE119EB340D734A989DB55
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,4F740BFF,6E188180,00000000,?), ref: 6E15DBFB
                                          • GetLastError.KERNEL32 ref: 6E15DC01
                                          • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000008), ref: 6E15DC15
                                          • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000028), ref: 6E15DC26
                                          • SetLastError.KERNEL32(00000000), ref: 6E15DC2D
                                            • Part of subcall function 6E15D9D0: GetLastError.KERNEL32(00000010,4F740BFF,7508FC30,?,00000000), ref: 6E15DA1A
                                          • __CxxThrowException@8.LIBCMT ref: 6E15DC78
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: AcquireContextCryptErrorLast$ExceptionException@8RaiseThrow
                                          • String ID: CryptAcquireContext$Crypto++ RNG
                                          • API String ID: 3279666080-1159690233
                                          • Opcode ID: 1a7cbc173b6a36ba1c4bd59d3d60433ab758c70cfc68e52608baf027997ced6a
                                          • Instruction ID: c8561427d5c4be2253f8e54bcdd374bfac8abd5892d3144484f45dc3c4fb2c48
                                          • Opcode Fuzzy Hash: 1a7cbc173b6a36ba1c4bd59d3d60433ab758c70cfc68e52608baf027997ced6a
                                          • Instruction Fuzzy Hash: B521D4B1258340AFE310DBA8CC45F9B7BECAB59754F50091DF1419A3C0EBB5A4849B61
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 6E16CE6C
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E16CE81
                                          • UnhandledExceptionFilter.KERNEL32(6E189428), ref: 6E16CE8C
                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 6E16CEA8
                                          • TerminateProcess.KERNEL32(00000000), ref: 6E16CEAF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                          • String ID:
                                          • API String ID: 2579439406-0
                                          • Opcode ID: a8c0973737ea0a27aecbd75d243ceac7f9bd9a2e3a3a7f061b6b84ddb0c84cd2
                                          • Instruction ID: 2a8ea64c9e30a49a2409458ad5548f2e4a84052b0fa0c07c44511fb510af6506
                                          • Opcode Fuzzy Hash: a8c0973737ea0a27aecbd75d243ceac7f9bd9a2e3a3a7f061b6b84ddb0c84cd2
                                          • Instruction Fuzzy Hash: 0321F0B4904A88DFCF50CF9CD048AAE3BB4FB0A314F10C41AE40987B48EBB04985AF15
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E1624A1
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • std::exception::exception.LIBCMT ref: 6E16248C
                                            • Part of subcall function 6E169533: std::exception::_Copy_str.LIBCMT ref: 6E16954E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                          • String ID:
                                          • API String ID: 757275642-0
                                          • Opcode ID: c787262926eeb0a988f05bc1dc9fd81567431c6eb717ed59424e0ddd4deb9c53
                                          • Instruction ID: 3afb90bd07bc6afdcd0deda9c2bea61f1e18127c5c93681fa63dba1b8725cda1
                                          • Opcode Fuzzy Hash: c787262926eeb0a988f05bc1dc9fd81567431c6eb717ed59424e0ddd4deb9c53
                                          • Instruction Fuzzy Hash: 5D328071A006068FDB54CFE8C890AAEB7B9FF99744B24451DE816DB354EB30ED90DB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 956f657a78e45ba31db5c188136a234022500ab96138bd29383dbf76a14f3f0a
                                          • Instruction ID: d6741a0172fd554c92dc5564f29423b04a688ca9d5e69789e007465b468432ca
                                          • Opcode Fuzzy Hash: 956f657a78e45ba31db5c188136a234022500ab96138bd29383dbf76a14f3f0a
                                          • Instruction Fuzzy Hash: 4802CE704187988FC764CF6DC8A093EBBF1EBDA311F41490EE2F657295C234A568EB61
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 8eefdb323890d976819852e05fc220db0f5ec88cc472a71eec33ddc20f266bf3
                                          • Instruction ID: 16dd42a6359cec17d456efbc6087a55805bb9e761aa5c9c521cccbeb6d4c1c04
                                          • Opcode Fuzzy Hash: 8eefdb323890d976819852e05fc220db0f5ec88cc472a71eec33ddc20f266bf3
                                          • Instruction Fuzzy Hash: DCE1C2704187988FC764CF6DC8A093E7BF1EBD6211F41450EE2F5472A9D234A16CEB21
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HERE$LOOK$Guq$Guq
                                          • API String ID: 0-1031546151
                                          • Opcode ID: 01f8488a27b2fbe7077ef6ffcfd5044e8addd815ed89afc6266cc93b99e52fac
                                          • Instruction ID: d146daedab2c6e7f6e586c56f65b24c5fa4a08f7a4678bb051cafab690ffaa19
                                          • Opcode Fuzzy Hash: 01f8488a27b2fbe7077ef6ffcfd5044e8addd815ed89afc6266cc93b99e52fac
                                          • Instruction Fuzzy Hash: EFF18174E412298FEBA4DF69C984BD9B7F5BB48310F1086E6D50DA7251DB309E818FA0
                                          APIs
                                          • CryptGenRandom.ADVAPI32(?,?,?,4F740BFF,00000000), ref: 6E15DE6F
                                          • __CxxThrowException@8.LIBCMT ref: 6E15DEB9
                                            • Part of subcall function 6E15DD20: CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,6E17F0E6,000000FF,6E15DF67,00000000,?), ref: 6E15DDB4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Crypt$ContextException@8RandomReleaseThrow
                                          • String ID: CryptGenRandom
                                          • API String ID: 1047471967-3616286655
                                          • Opcode ID: 28da6156c7a2a655b7662e086b22ecee4a152a96f48a090daea5448a8cf2ab76
                                          • Instruction ID: 0b7459b685a35374cc019191f44cc037abf157d3f06e8823f5c33e43ec7172e6
                                          • Opcode Fuzzy Hash: 28da6156c7a2a655b7662e086b22ecee4a152a96f48a090daea5448a8cf2ab76
                                          • Instruction Fuzzy Hash: C2213BB51187849FD704DF68C444BABBBE9FB89714F008A0DF46587384DB74A588DF52
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 87f8fb26f76a2a3fffc2412126b9f386b173cf6b667232845e0882952d379d47
                                          • Instruction ID: 73b0b1dad3f11d07cd6a5708202f4dd56eabff5f8fe8fbdec0cdd1b13b46f5a6
                                          • Opcode Fuzzy Hash: 87f8fb26f76a2a3fffc2412126b9f386b173cf6b667232845e0882952d379d47
                                          • Instruction Fuzzy Hash: 5252F0B05146658BC754CF2DC0E053ABBF2EFCA311BA4C55DD4E68B38AD234B591EBA0
                                          APIs
                                          • GetLastError.KERNEL32(00000010,4F740BFF,7508FC30,?,00000000), ref: 6E15DA1A
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLastXinvalid_argumentstd::_
                                          • String ID: operation failed with error $OS_Rng:
                                          • API String ID: 406877150-700108173
                                          • Opcode ID: a7d2a9fb7bfedfbb749e3e2b97037031b41d90f7633d4237efbe1980a969e5a6
                                          • Instruction ID: 4a155d3b2fe95edc15cf01f5a8beeabf4b676ab539e944791aeb73b15b5310f5
                                          • Opcode Fuzzy Hash: a7d2a9fb7bfedfbb749e3e2b97037031b41d90f7633d4237efbe1980a969e5a6
                                          • Instruction Fuzzy Hash: 84417AB19083809FD320CFA9C841B9BBBE9BF99654F104D2DE19987340EB759488DF63
                                          APIs
                                          • std::exception::exception.LIBCMT ref: 6E161E1D
                                            • Part of subcall function 6E169533: std::exception::_Copy_str.LIBCMT ref: 6E16954E
                                          • __CxxThrowException@8.LIBCMT ref: 6E161E32
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                          • String ID:
                                          • API String ID: 757275642-0
                                          • Opcode ID: 2c7cb01da3f7e8958b6c3cad5be336bc4592ef2f4a5b0e91c93f0d408a26b393
                                          • Instruction ID: 7b9158670ec7ad9bf3f101e65c638e60c166ac19255eab778c2010efd7c2b8cc
                                          • Opcode Fuzzy Hash: 2c7cb01da3f7e8958b6c3cad5be336bc4592ef2f4a5b0e91c93f0d408a26b393
                                          • Instruction Fuzzy Hash: 0832B471B002069FDB48CFD9C8909AEB3BABF99744B24851DE516DB350EB30ED94DB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a4b59e691a78c0b33a757956e3a2ae5fc454f3c514eb3d62a9310150ec5b287
                                          • Instruction ID: 1224c99bade27e7ebeba343fa3b0aaff02fbb137818b9fdf07ffe20d87c08426
                                          • Opcode Fuzzy Hash: 0a4b59e691a78c0b33a757956e3a2ae5fc454f3c514eb3d62a9310150ec5b287
                                          • Instruction Fuzzy Hash: D3322422E29F414DDB639534C832326A25DAFB77D4F11D727F829B5E9AEB29C4C36100
                                          APIs
                                            • Part of subcall function 6E104760: __CxxThrowException@8.LIBCMT ref: 6E1047F9
                                          • CryptReleaseContext.ADVAPI32(?,00000000,00000000,?), ref: 6E15DF7B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ContextCryptException@8ReleaseThrow
                                          • String ID:
                                          • API String ID: 3140249258-0
                                          • Opcode ID: 56eded19f4a49a7866cb49aa73b71446769da8f534d9e617ca32a20f9d1dda24
                                          • Instruction ID: 0e900488d3883d3771a83b8b6b04ab8eefa558108ff1db12a0a6d0536cdc0014
                                          • Opcode Fuzzy Hash: 56eded19f4a49a7866cb49aa73b71446769da8f534d9e617ca32a20f9d1dda24
                                          • Instruction Fuzzy Hash: 8D21BEF5508344AFC200DF54D840B8BBBE8EB9AB68F100A1DF85583381DB71E949CBA2
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,6E17F0E6,000000FF,6E15DF67,00000000,?), ref: 6E15DDB4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ContextCryptRelease
                                          • String ID:
                                          • API String ID: 829835001-0
                                          • Opcode ID: fcc43bfdda915e5cf961aedd0e8136e2bd5cde6339ab4f0542f9389c6da28d01
                                          • Instruction ID: b9b042450e27f53bed0b859dcdc6d0b1a06b19ec0c9dfb8c66658428a5bf4ceb
                                          • Opcode Fuzzy Hash: fcc43bfdda915e5cf961aedd0e8136e2bd5cde6339ab4f0542f9389c6da28d01
                                          • Instruction Fuzzy Hash: 5F11DAF16047915BE710CF9CC880B6B77E8F706650F14492DED25C7384EB799494AB91
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6E15D803
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ContextCryptRelease
                                          • String ID:
                                          • API String ID: 829835001-0
                                          • Opcode ID: ce50d8d958489936f1667875fadee820d65547324e95c5fd660f708a2db7c655
                                          • Instruction ID: 5297493367f2bae7f6a4e201f3750e3406734b3144ba953d387432b5c9d5599d
                                          • Opcode Fuzzy Hash: ce50d8d958489936f1667875fadee820d65547324e95c5fd660f708a2db7c655
                                          • Instruction Fuzzy Hash: 86D02EB070021153D2209BA48C00B8777CC4F11B00F248828F96AD2280CAB0C8D09BD8
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6E1835F5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ContextCryptRelease
                                          • String ID:
                                          • API String ID: 829835001-0
                                          • Opcode ID: 9ff9e502f1352d18503590ed1c0dcee18a97528844390a551aef1ecd3e97c847
                                          • Instruction ID: 4d057326428ede1bce0dffbb7da6ffed90456d4aff400da55f3b54c42858a45a
                                          • Opcode Fuzzy Hash: 9ff9e502f1352d18503590ed1c0dcee18a97528844390a551aef1ecd3e97c847
                                          • Instruction Fuzzy Hash: 9DD05EB150155257EE50CAAC9829F9B33DC5B12640F2C0014E505DB180DF64D981AB64
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6E15D7E0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ContextCryptRelease
                                          • String ID:
                                          • API String ID: 829835001-0
                                          • Opcode ID: 83aa2506cc65c9a0187af83800dcadce459849d98edfcfdab2950d37c8b5bb44
                                          • Instruction ID: b12d52dc0ca704f904ff2c694b40ff9a42daa6c9f64978c86a43867e902a1f3f
                                          • Opcode Fuzzy Hash: 83aa2506cc65c9a0187af83800dcadce459849d98edfcfdab2950d37c8b5bb44
                                          • Instruction Fuzzy Hash: 4CB012B07012016BEE3C8F218B68B2F3A19AF4274AF20844C661A592808E63D402DA08
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 09d429e98357fd4b106b9c3e744c4a9d03de43b513d7329856e6d7e5f9c8e4d7
                                          • Instruction ID: f030e191fc4cb642e48b8593d367386a2527d40a44b7b8e8d5a37dd6400d7836
                                          • Opcode Fuzzy Hash: 09d429e98357fd4b106b9c3e744c4a9d03de43b513d7329856e6d7e5f9c8e4d7
                                          • Instruction Fuzzy Hash: CF917D71818B868BE701CF6DC8425AAB7E0FFD9354F249B1DFDE462200EB749994C781
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: N@
                                          • API String ID: 0-1509896676
                                          • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                          • Instruction ID: 84478231f55b755ca9dca03bf12f6a1a40f589d4a5a1bc71e530dcb60e1132d0
                                          • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                          • Instruction Fuzzy Hash: 25612971A003168FDB28CF88C49469EBBF2BF88710F26C5AED9195F255C7B19994DB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q
                                          • API String ID: 0-1259897404
                                          • Opcode ID: dff3f0cdef92e735c9162e767aee525223997dcb190016cdd138582c6dcc5c3b
                                          • Instruction ID: eb57ace2938577117e13d4240687a81c5a9c36da6bd73aaa1caf4fb48a4f5bd3
                                          • Opcode Fuzzy Hash: dff3f0cdef92e735c9162e767aee525223997dcb190016cdd138582c6dcc5c3b
                                          • Instruction Fuzzy Hash: 8F71F870E042098FDB19DFBAE95079EBBF6FBC9300F14C529D4089B269DB78590ADB40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q
                                          • API String ID: 0-1259897404
                                          • Opcode ID: c43cbeba8674f00e6c22a442fcdd1c6d7a5047153b92ec799bbfb18e6ee32cee
                                          • Instruction ID: 8532b9c67f52716ffc2d136815a37c7afda11f0fb85e658ef369b65744957a29
                                          • Opcode Fuzzy Hash: c43cbeba8674f00e6c22a442fcdd1c6d7a5047153b92ec799bbfb18e6ee32cee
                                          • Instruction Fuzzy Hash: 6761E870E042098FDB19DFAAE95079ABBF6FFC9300F14C529D4089B269EB785909DB40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: b047373693e9cb2c16f0beaf54575c8f75f4f2de382469ac2ec07516f4230be5
                                          • Instruction ID: bbdd9f8c49093d04d9756e2ff48c3babb3ee8f78ceb0c2584ad6126dfa39c5f1
                                          • Opcode Fuzzy Hash: b047373693e9cb2c16f0beaf54575c8f75f4f2de382469ac2ec07516f4230be5
                                          • Instruction Fuzzy Hash: 2A519171818B828BE311CF6DC8815AAF7A0BFE9344F209B1DFDE462601EB759594D781
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 25dcc11d870f218c9611599aedeccf34c52bb894c8f490fe5e22bb40a015e76f
                                          • Instruction ID: a4657b724717520ad47c4fe7649b3a5509a4a5142d5d450ef594a2180b321e2e
                                          • Opcode Fuzzy Hash: 25dcc11d870f218c9611599aedeccf34c52bb894c8f490fe5e22bb40a015e76f
                                          • Instruction Fuzzy Hash: D8518171818B868BE301CF6DC8815AAF7A0BFE9344F20DB1DFDE462601EB759594D781
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: &
                                          • API String ID: 0-1010288
                                          • Opcode ID: 1f2976aaa882a6a6abf23a42752b55ce5613660628131567f9d011e75133eeb0
                                          • Instruction ID: 1d63f637de5479265b9a9beb507ac6f7937f96182068cd9256ee7be2361ebe6c
                                          • Opcode Fuzzy Hash: 1f2976aaa882a6a6abf23a42752b55ce5613660628131567f9d011e75133eeb0
                                          • Instruction Fuzzy Hash: C0514DB1D016188BEB68CF6BCD4479AFAF7AFC8201F14C1FA840CAA254DB354A958F45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8bq
                                          • API String ID: 0-187764589
                                          • Opcode ID: 234cc791dc61a4f300d07244ae9217657365420498ce3e9951ee17dfa6338d16
                                          • Instruction ID: 11a001ddb8732dea325297c506fe4edc6b9b823ffbe55cebe4a1fcdc07f03162
                                          • Opcode Fuzzy Hash: 234cc791dc61a4f300d07244ae9217657365420498ce3e9951ee17dfa6338d16
                                          • Instruction Fuzzy Hash: DE31A675D412089FDB04CFA9D880AEEBBB5FF49310F10946AE515B7360DB74AA04CF95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: lbq
                                          • API String ID: 0-2620278156
                                          • Opcode ID: 0cd03cccccfbb0828f981d9200dd98454142720e7bbe8c1fd6726c036f37a8f0
                                          • Instruction ID: 527c1579185463517eeb0018788091a39c7aef36dac03180f5d41760e68577c3
                                          • Opcode Fuzzy Hash: 0cd03cccccfbb0828f981d9200dd98454142720e7bbe8c1fd6726c036f37a8f0
                                          • Instruction Fuzzy Hash: A231C775D41208AFDB04DFA8D880AEEBBB5FF49310F10946AE511B7360DB74AA04CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: lbq
                                          • API String ID: 0-2620278156
                                          • Opcode ID: 3be51ab9d5604a800ee5f5645329723fd3224d19374e09fd24c585de08e69bd4
                                          • Instruction ID: 8fe269296e60f229140871df8b4bc8b4a2bb1703b8787d50e7ea4ba17e9b1ba4
                                          • Opcode Fuzzy Hash: 3be51ab9d5604a800ee5f5645329723fd3224d19374e09fd24c585de08e69bd4
                                          • Instruction Fuzzy Hash: 1331D4B5D412089FDB04CFA8D980AEEBBB5EF49300F10946AE511B7360DB74AA04CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8bq
                                          • API String ID: 0-187764589
                                          • Opcode ID: 7aca49686d795ae9f51e20b45e6efe2ef4d484ee8e9e1a0e24009825a121b165
                                          • Instruction ID: a11426998eba96f76cc65d73661bb5212845d8e200f8fa5d1ec0fc6bc369ae3f
                                          • Opcode Fuzzy Hash: 7aca49686d795ae9f51e20b45e6efe2ef4d484ee8e9e1a0e24009825a121b165
                                          • Instruction Fuzzy Hash: 7831C475D412089FDB04CFA8D980AEEBBB6FF49300F10946AE911B7360DB74AA04CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e57defef04cdd397cd2c8daee722437a19485c34a4febab60d24264a227c0bb9
                                          • Instruction ID: aa74d366f6ce4f68929a12cab1b95c4886cb057314d35bff452369b36ed46ff4
                                          • Opcode Fuzzy Hash: e57defef04cdd397cd2c8daee722437a19485c34a4febab60d24264a227c0bb9
                                          • Instruction Fuzzy Hash: 755299716483058FC758CF5EC98054AF7F2BBC8718F18CA7DA599C6B21E374E9468B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 984bd7e612ac0186234b2a23b3286d9c3b6923b3a8efa2217aff094da39579ec
                                          • Instruction ID: 33e9686994f45082671200f3f597723b5cbd99ca3981ef518f1e00b8ea2f2807
                                          • Opcode Fuzzy Hash: 984bd7e612ac0186234b2a23b3286d9c3b6923b3a8efa2217aff094da39579ec
                                          • Instruction Fuzzy Hash: 2C411975C152688FDB01EFA8D990BDDBFB0FF0A310F14905AD448A7261D7389949CF65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 79c477024e71e463717b892515b73390a80f0de7856b5551fe47b4012150965c
                                          • Instruction ID: f58f59fd753db1d5a06673b96f9205d3f47784dbc8776f863be213912ecc1d89
                                          • Opcode Fuzzy Hash: 79c477024e71e463717b892515b73390a80f0de7856b5551fe47b4012150965c
                                          • Instruction Fuzzy Hash: AA223E71A083058FC344CF69C88064AF7E2FFC8318F59892DE598D7715E775EA4A8B92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c32662eef60f0c471b7fdac11190f1f5451b2dd2c365e0225398f315df61cf83
                                          • Instruction ID: 9ded071ad59cd704732e825f270e8da77efaef640fe718d0d309e11cafb84771
                                          • Opcode Fuzzy Hash: c32662eef60f0c471b7fdac11190f1f5451b2dd2c365e0225398f315df61cf83
                                          • Instruction Fuzzy Hash: A80296717443018FC758CF6ECC8154AB7E2ABC8314F19CA7DA499C7B21E778E94A8B52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 881196949fef0fb7f392440c2fb8903dea1bfa82a08d655cf26c4666a8209639
                                          • Instruction ID: 3373aa6829ed376d71dd8feb32c70f7e316c051602c1be3356b2c4613a5723de
                                          • Opcode Fuzzy Hash: 881196949fef0fb7f392440c2fb8903dea1bfa82a08d655cf26c4666a8209639
                                          • Instruction Fuzzy Hash: F9029F3280A2B49FDB92EF5ED8405AB73F4FF90355F43892ADC8163241D335EA499794
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9ed4dd07c22fc926db6187162ceb4f6c9de92f9471c57bfdad431e9e1507ebf3
                                          • Instruction ID: 5f0367c05d9e803403292a80ae2ee566663ed1d763c363ca41ed2b3cb0e999bd
                                          • Opcode Fuzzy Hash: 9ed4dd07c22fc926db6187162ceb4f6c9de92f9471c57bfdad431e9e1507ebf3
                                          • Instruction Fuzzy Hash: 2ED1A4716443018FC348CF1EC98164AF7E2BFD8718F19CA6DA599C7B21D379E9468B42
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35bd22f95dab943cb3221f365cd1ea733415a38271d1e5144e58f245e77465ab
                                          • Instruction ID: 11a1f37e77bd3a10e9079b714d218fd6a0c7e86ff7a5ab61f62f7fd414b00901
                                          • Opcode Fuzzy Hash: 35bd22f95dab943cb3221f365cd1ea733415a38271d1e5144e58f245e77465ab
                                          • Instruction Fuzzy Hash: A3A144324192B49FDB92EF6ED8400AB73E5EF94355F43492FDCC167281C235EA089795
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 326bc5982354ac438e1a9f739f44fe0e5fdd5d63dcd15d05e6311c1e57b5f58c
                                          • Instruction ID: 77c67e4e61c8f026e6fc0232a3d214a61c66183bd9c4334c8bf01a2cff0a98da
                                          • Opcode Fuzzy Hash: 326bc5982354ac438e1a9f739f44fe0e5fdd5d63dcd15d05e6311c1e57b5f58c
                                          • Instruction Fuzzy Hash: 8171A371A083058FC344CF1AC94164AF7E2FFC8718F19C96DA898C7B21E775E9468B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7cdc20a2fddfc9a188b602cbb1ee077ba7ac09752fea693f80eeb2021d0fc81c
                                          • Instruction ID: c816e45da3559c3907b7fb3d5880d540d82664f1bd06f7db55950fe47940c881
                                          • Opcode Fuzzy Hash: 7cdc20a2fddfc9a188b602cbb1ee077ba7ac09752fea693f80eeb2021d0fc81c
                                          • Instruction Fuzzy Hash: 1F51F776A083058FC344CF69C88064AF7E2FBC8318F59C93DE999C7715E675E94A8B81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ba715fd754b714e9d068fda8deb8e9fc5fdebe33215753f3ecb5741719fa00b
                                          • Instruction ID: 69990af1b33206951b8dcabbca6b0527f4b1e7b774d6cca876f21f347aff3c55
                                          • Opcode Fuzzy Hash: 6ba715fd754b714e9d068fda8deb8e9fc5fdebe33215753f3ecb5741719fa00b
                                          • Instruction Fuzzy Hash: 9441D972B042168FCB48CE2ECC4165AF7E6FBC8210B4DC639A859C7B15E734E9498B91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eaa7ebe4308b3eb0f49111da13131894c6bda5a29e7c468c376d0e92ad7e63e0
                                          • Instruction ID: 48ce99829b7a187674f63f859877b65ca746d7563ef6263a1c632878a71739a7
                                          • Opcode Fuzzy Hash: eaa7ebe4308b3eb0f49111da13131894c6bda5a29e7c468c376d0e92ad7e63e0
                                          • Instruction Fuzzy Hash: 4A51E3B4D042489FDB24DFA9D5857ADFBF1FF09300F20A069D419AB251D774A885CF45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad7eaf58fe2e540b056f85ce4ffafd4282aebe89e7a6ca38e38ea4fa6da1edf3
                                          • Instruction ID: 79bf7f3c4ccddc2596f768b04127fb1712b4c6988ff407919ac7080f975f5c64
                                          • Opcode Fuzzy Hash: ad7eaf58fe2e540b056f85ce4ffafd4282aebe89e7a6ca38e38ea4fa6da1edf3
                                          • Instruction Fuzzy Hash: F241E2B4D002489FDB24DFA9D885BADFBF1FF09300F20A069E819AB251D774A885CF45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1f16fac0e08844244c307e63505c6d9d90a427d77b22931de198b8afb797581
                                          • Instruction ID: 368b977be63f6a43537b59f876dba326a776e7d4574b711782a98b8c4ea8b699
                                          • Opcode Fuzzy Hash: b1f16fac0e08844244c307e63505c6d9d90a427d77b22931de198b8afb797581
                                          • Instruction Fuzzy Hash: FB41AF7120C30D0FD35CFDE896DB397B6D4E389280F41943F9A118B1A2FEA4955996C4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2104811256.0000000003460000.00000040.00000800.00020000.00000000.sdmp, Offset: 03460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3460000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b18595fdcfbf55f4e99adc97c01483d520893a3be37f775d2cdc122982735bf
                                          • Instruction ID: f7098daea2e8cf40eac0733652a6554187884c1b3771b713230d66230980dfb0
                                          • Opcode Fuzzy Hash: 7b18595fdcfbf55f4e99adc97c01483d520893a3be37f775d2cdc122982735bf
                                          • Instruction Fuzzy Hash: 5B4110B1E016588BEB5CCF6B8D4078AFAF7BFC8210F14C1BA851CAB264DB7109958F45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eebff512d34c9d65d1ef18b2539f5f4bdf118ad9d56aefcd69bbad0e5860e188
                                          • Instruction ID: de9a6e6f1a1f4a634e85f6ac2bd65a7333cc3bad311e14894d6f7cef12f3252a
                                          • Opcode Fuzzy Hash: eebff512d34c9d65d1ef18b2539f5f4bdf118ad9d56aefcd69bbad0e5860e188
                                          • Instruction Fuzzy Hash: 5731CBB9D052589FCB10DFA9D580AEDFBF4AB09310F14906AE414B7210D338A989CF64
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aab858adfdc6ac754d83c0adac154295d52a7e93161f4c3a00eb14059c25d6c9
                                          • Instruction ID: 93ceda96828f21feef3b971b8ccc2a87d66cce0bff8096295c3a99743b440a0a
                                          • Opcode Fuzzy Hash: aab858adfdc6ac754d83c0adac154295d52a7e93161f4c3a00eb14059c25d6c9
                                          • Instruction Fuzzy Hash: CC31AAB5D052589FCB10DFAAD484AEEFBF4AB49310F14906AE418B7210D738A985CF64
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca6c81c41dd0c1d9e723f1384a5fa336adf8b0030137f6ad88010526cee788dc
                                          • Instruction ID: 4761bee85eefd9fc89f95c5631bf96223fec983d2e6903bfb64d57ab7fab6069
                                          • Opcode Fuzzy Hash: ca6c81c41dd0c1d9e723f1384a5fa336adf8b0030137f6ad88010526cee788dc
                                          • Instruction Fuzzy Hash: 5E31A675D412089FDB04CFA9D880AEEBBB6FF49310F10946AE515B7360DB74AA04CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a287d5e04b7ee1cba49a9a6a17cbb0dbe66664291dcd8914fa359b85473965aa
                                          • Instruction ID: b46a28b8781df43d821bdeecc782741fa83c4c09b9aaedafb9adf03186b95c9d
                                          • Opcode Fuzzy Hash: a287d5e04b7ee1cba49a9a6a17cbb0dbe66664291dcd8914fa359b85473965aa
                                          • Instruction Fuzzy Hash: FE31A875D412089FDB04CFA9D880AEEBBB5FF49310F109465E515B7360DB74AA04CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 66055e518557babc5bb037bd5f5bb69e3d4816221d3f2493e1088043e1761a6f
                                          • Instruction ID: 1cc7451cbc7a48f5e860ea5d60153e0fe487cafdc65cafbcc2d59785828c7d15
                                          • Opcode Fuzzy Hash: 66055e518557babc5bb037bd5f5bb69e3d4816221d3f2493e1088043e1761a6f
                                          • Instruction Fuzzy Hash: 3731B475D412089FDB04CFA8D580AEEBBB6FF49300F10946AE515B7360DB74AA44CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef03f46121303b3603285ad0ed06008f1f2faf780d824e070cc921839bb90c91
                                          • Instruction ID: 6613363f2292b052b73447d3e551bbb83770a830e3223cc23a68adc13ee33e76
                                          • Opcode Fuzzy Hash: ef03f46121303b3603285ad0ed06008f1f2faf780d824e070cc921839bb90c91
                                          • Instruction Fuzzy Hash: 2431C7B5D412089FDB04CFA8D980AEEBBB6FF49300F10946AE515B7360DB749A04CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c2a4e5319b11e48729058604c95f45a5f512c01db7aed5589e00d7c185c0113
                                          • Instruction ID: b07b0338a9e3e38618fe2a597921a7694a5e0bb23f3f77b546dfa2b7a02a066a
                                          • Opcode Fuzzy Hash: 6c2a4e5319b11e48729058604c95f45a5f512c01db7aed5589e00d7c185c0113
                                          • Instruction Fuzzy Hash: E02127327151564BE304CE2EC8908A2B7A7EF9D31472981F9E818CB283CA70E956C7D0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 519b3b72f4d0e40bab733eecf5f1683974662187ffa70974d5324fa566ddd64b
                                          • Instruction ID: 0e3bc54b6f403fe985da9ab1dfd7040f63a7132ae0118c87cfd463aa26ce9d94
                                          • Opcode Fuzzy Hash: 519b3b72f4d0e40bab733eecf5f1683974662187ffa70974d5324fa566ddd64b
                                          • Instruction Fuzzy Hash: C6218E757046874BE715CF2EC84059BBBA3FFD9300B1980A6E858DB242C674E866CBC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 491a25c253d72754cd753df5ea73fe4730b8206852d94c2a89a3efade510d907
                                          • Instruction ID: b856beb31300d1defc40181482bb72e43845aeeef4f9c327a1d3817e26e5d7bb
                                          • Opcode Fuzzy Hash: 491a25c253d72754cd753df5ea73fe4730b8206852d94c2a89a3efade510d907
                                          • Instruction Fuzzy Hash: D2110B36709A430BF305CF2EE840483B793AFDD31476A85AEA454DF146CB71E456C791
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef0fe430f5274c6fa702dd06a168edf7b4634a1fa37fbabfcf4ba1ecb026e4e8
                                          • Instruction ID: 7c32803b8a14c8e8b6bfc3bbace2d87f8874d53bee3d3ffdd275cc81a4f90ddc
                                          • Opcode Fuzzy Hash: ef0fe430f5274c6fa702dd06a168edf7b4634a1fa37fbabfcf4ba1ecb026e4e8
                                          • Instruction Fuzzy Hash: 6E110632A156924BD3018E2DC8406C6BB67AFDE710B1A81EBE854DF217CB74985BC7D0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2115048253.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b80000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2bde13cacb3c282e92d83541c9abe76532abda586aa7976f94663f815a9dd0d9
                                          • Instruction ID: efd7fd4265b4958e2c1cf7ac6b9e690d6753de680438f9f7e2d272eecf3866b1
                                          • Opcode Fuzzy Hash: 2bde13cacb3c282e92d83541c9abe76532abda586aa7976f94663f815a9dd0d9
                                          • Instruction Fuzzy Hash: 4E21A8B5D052089FCB10DFA9D584AEEBBF4FB49310F24A06AE818B3210C735A945CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f8339dd5ea243b7f1d348fb5f89fdeb03b4fe66e44cbfdd072a084bd825033c5
                                          • Instruction ID: f08b2313b0e74264599a2ef39adf46e8e1697c9fb7729bb70655dcea2916e45a
                                          • Opcode Fuzzy Hash: f8339dd5ea243b7f1d348fb5f89fdeb03b4fe66e44cbfdd072a084bd825033c5
                                          • Instruction Fuzzy Hash: D2115EB6A08609EFC704CF59D841B9AFBF4FB45724F20822EE81997B80D735A950DB90
                                          APIs
                                          • operator+.LIBCMT ref: 6E176FCC
                                            • Part of subcall function 6E174147: DName::DName.LIBCMT ref: 6E17415A
                                            • Part of subcall function 6E174147: DName::operator+.LIBCMT ref: 6E174161
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: NameName::Name::operator+operator+
                                          • String ID:
                                          • API String ID: 2937105810-0
                                          • Opcode ID: ada3eab7e830d46dd3a4967eb2e22aa34028f190c9c4e6c1588606f1a0644663
                                          • Instruction ID: 81f18639bd44c891fa16c48b3d83776b2b1c2ec36fd03df5f84ab0e163971dff
                                          • Opcode Fuzzy Hash: ada3eab7e830d46dd3a4967eb2e22aa34028f190c9c4e6c1588606f1a0644663
                                          • Instruction Fuzzy Hash: 4DD13271900209AFDF20DFE8C895AEEBBF8EF19705F104456E515EB290DB349AC5EB60
                                          APIs
                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ECA5
                                          • __mtterm.LIBCMT ref: 6E16ECB1
                                            • Part of subcall function 6E16E97C: DecodePointer.KERNEL32(00000012,6E16A397,6E16A37D,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16E98D
                                            • Part of subcall function 6E16E97C: TlsFree.KERNEL32(0000000A,6E16A397,6E16A37D,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16E9A7
                                            • Part of subcall function 6E16E97C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6E16A397,6E16A37D,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E172325
                                            • Part of subcall function 6E16E97C: DeleteCriticalSection.KERNEL32(0000000A,?,?,6E16A397,6E16A37D,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E17234F
                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6E16ECC7
                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6E16ECD4
                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6E16ECE1
                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6E16ECEE
                                          • TlsAlloc.KERNEL32(?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ED3E
                                          • TlsSetValue.KERNEL32(00000000,?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ED59
                                          • __init_pointers.LIBCMT ref: 6E16ED63
                                          • EncodePointer.KERNEL32(?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ED74
                                          • EncodePointer.KERNEL32(?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ED81
                                          • EncodePointer.KERNEL32(?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ED8E
                                          • EncodePointer.KERNEL32(?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16ED9B
                                          • DecodePointer.KERNEL32(Function_0006EB00,?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16EDBC
                                          • __calloc_crt.LIBCMT ref: 6E16EDD1
                                          • DecodePointer.KERNEL32(00000000,?,?,6E16A2D4,6E1995C0,00000008,6E16A468,?,?,?,6E1995E0,0000000C,6E16A523,?), ref: 6E16EDEB
                                          • GetCurrentThreadId.KERNEL32 ref: 6E16EDFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                          • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                          • API String ID: 1868149495-3819984048
                                          • Opcode ID: 0c908476b336245310ce82c2bf3e32e3ad0499e38a0317cc693c51266ac778e8
                                          • Instruction ID: de3a7ebb464484796d87f49062f7f6fb1cd483d3fa8d6d188737155163000ee2
                                          • Opcode Fuzzy Hash: 0c908476b336245310ce82c2bf3e32e3ad0499e38a0317cc693c51266ac778e8
                                          • Instruction Fuzzy Hash: F6314431900B199EDF10DFB99C0867F3FE9BF57654724861AE4249A250EB309691FF90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove$Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 1771113911-4289949731
                                          • Opcode ID: 494dfe0cf97af70b019d485e91f9409036088d1a4534ab745d54e3b258d08b39
                                          • Instruction ID: 7e68490232b9a644fa40d99ac677535ca3b8d71fb57df44400d157a81d86353a
                                          • Opcode Fuzzy Hash: 494dfe0cf97af70b019d485e91f9409036088d1a4534ab745d54e3b258d08b39
                                          • Instruction Fuzzy Hash: B9B17D71B181459BEB18CE9CCCA1ADFB3A6EB95304724492CF992CB740D630ECD5DBA1
                                          APIs
                                          • UnDecorator::getBasicDataType.LIBCMT ref: 6E177FFF
                                          • DName::operator=.LIBCMT ref: 6E178013
                                          • DName::operator+=.LIBCMT ref: 6E178021
                                          • UnDecorator::getPtrRefType.LIBCMT ref: 6E17804D
                                          • UnDecorator::getDataIndirectType.LIBCMT ref: 6E1780CA
                                          • UnDecorator::getBasicDataType.LIBCMT ref: 6E1780D3
                                          • operator+.LIBCMT ref: 6E178166
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Decorator::getType$Data$Basic$IndirectName::operator+=Name::operator=operator+
                                          • String ID: std::nullptr_t$volatile
                                          • API String ID: 2203807771-3726895890
                                          • Opcode ID: 2f4215f4a057866f65d73ec51bec5883e3010aefadf5fe87f65892e8b3d41537
                                          • Instruction ID: c30afa2381b368ea5eaa12a6627493b4b3397f9d0745e341c8069e52c01b2c8d
                                          • Opcode Fuzzy Hash: 2f4215f4a057866f65d73ec51bec5883e3010aefadf5fe87f65892e8b3d41537
                                          • Instruction Fuzzy Hash: AE419B72504169AFCF31CFD8C8949EE7B78FB16B45F208466E9645B240D7319AC2EB50
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E125177
                                            • Part of subcall function 6E132820: _malloc.LIBCMT ref: 6E132871
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000004), ref: 6E1251B9
                                          • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 6E1251D5
                                          • SafeArrayAccessData.OLEAUT32(00000000,00000000), ref: 6E1251E5
                                          • _memmove.LIBCMT ref: 6E1251FF
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E125208
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E12522C
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6E125263
                                          • VariantClear.OLEAUT32(?), ref: 6E12526C
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6E1252AD
                                          • VariantClear.OLEAUT32(?), ref: 6E1252B6
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000002,00000002), ref: 6E1252D2
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E12534E
                                          • VariantClear.OLEAUT32(?), ref: 6E125358
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$ElementVariant$Clear$CreateDataVector$AccessDestroyInitUnaccess_malloc_memmove
                                          • String ID:
                                          • API String ID: 452649785-0
                                          • Opcode ID: f005801081594240637fc0bf0dae030ef00457590c0b9f63801d248363675173
                                          • Instruction ID: 4402d28c06e62f369bde6d1fa53656ee68450b98b34fe34c54ed986a239fb6c2
                                          • Opcode Fuzzy Hash: f005801081594240637fc0bf0dae030ef00457590c0b9f63801d248363675173
                                          • Instruction Fuzzy Hash: CD712E7190061AEFDB00CFA5C884AEFBBB8FF59704F108129E905D7241E774E985DBA1
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E11FA0F
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E11FA22
                                          • SafeArrayGetElement.OLEAUT32 ref: 6E11FA5A
                                            • Part of subcall function 6E123A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E123B71
                                            • Part of subcall function 6E123A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E123B83
                                            • Part of subcall function 6E1269C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E126A08
                                            • Part of subcall function 6E1269C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E126A15
                                            • Part of subcall function 6E1269C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E126A41
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                            • Part of subcall function 6E11DFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E11DFF6
                                            • Part of subcall function 6E11DFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E11E003
                                            • Part of subcall function 6E11DFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E11E02F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Bound$Destroy$Element
                                          • String ID: RS7m$RS{m
                                          • API String ID: 959723449-144615663
                                          • Opcode ID: 7d2e614608e21682d1e2b15266d387a02510df6359df3019fd16fe9e9c7c7319
                                          • Instruction ID: cb3adc86cad6d7894a7abcfdf3c31b912989192fe6ca4f8d75a26b2138f51530
                                          • Opcode Fuzzy Hash: 7d2e614608e21682d1e2b15266d387a02510df6359df3019fd16fe9e9c7c7319
                                          • Instruction Fuzzy Hash: 0DC17170A142059FDB40CFA8CC94FDDB7B9AF89304F2085A8E515AB286DB71EDC1DB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Init$Clear$Copy
                                          • String ID:
                                          • API String ID: 3833040332-0
                                          • Opcode ID: 2a3207fabbdfff3617b82defe0153e1fdf83404ce732bf59a70594ba9eca9605
                                          • Instruction ID: 01ec26779be6f84e0865f33a06c02fe9b1b5bf6e222236e7de57b60dfe479a94
                                          • Opcode Fuzzy Hash: 2a3207fabbdfff3617b82defe0153e1fdf83404ce732bf59a70594ba9eca9605
                                          • Instruction Fuzzy Hash: F9815C7190061AAFDF04DFE8CC84BEEBBB9BF49304F144569E505AB244DB34A985DB90
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12D8EC
                                          • VariantInit.OLEAUT32 ref: 6E12D902
                                          • VariantInit.OLEAUT32(?), ref: 6E12D90D
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E12D929
                                          • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6E12D966
                                          • VariantClear.OLEAUT32(?), ref: 6E12D973
                                          • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6E12D9B4
                                          • VariantClear.OLEAUT32(?), ref: 6E12D9C1
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12DA6F
                                          • VariantClear.OLEAUT32(?), ref: 6E12DA80
                                          • VariantClear.OLEAUT32(?), ref: 6E12DA87
                                          • VariantClear.OLEAUT32(?), ref: 6E12DA99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                          • String ID:
                                          • API String ID: 1625659656-0
                                          • Opcode ID: de571ec0da13a58408daf530597dae37765d62a10d5126ec3f5eb29c03245a8d
                                          • Instruction ID: 0e3f68124865b1d5158f3b60d9ddc688503410c968f847775aba362510a4f813
                                          • Opcode Fuzzy Hash: de571ec0da13a58408daf530597dae37765d62a10d5126ec3f5eb29c03245a8d
                                          • Instruction Fuzzy Hash: 2A8127721087029FC700CFA8C884B5BB7E8BFD9714F148A6DE99597240EB74E946DF92
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                          • String ID: invalid string position$string too long
                                          • API String ID: 2168136238-4289949731
                                          • Opcode ID: f479ca885e84b5b90fe41d327bde7bd28d39592917aa4269d32b468319894a8a
                                          • Instruction ID: d7765f5f77d9259d167c6543c24771ffb53d692ddead7608c73eeab63d4de827
                                          • Opcode Fuzzy Hash: f479ca885e84b5b90fe41d327bde7bd28d39592917aa4269d32b468319894a8a
                                          • Instruction Fuzzy Hash: 9E41B5313182054BE714CEDDD890ADEF3AAEBA1324720093EE591CBB44D730DCC9A7A2
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E124BDC
                                          • VariantInit.OLEAUT32(?), ref: 6E124BE5
                                          • VariantInit.OLEAUT32(?), ref: 6E124BEB
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E124BF6
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E124C2A
                                          • VariantClear.OLEAUT32(?), ref: 6E124C37
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E125107
                                          • VariantClear.OLEAUT32(?), ref: 6E125117
                                          • VariantClear.OLEAUT32(?), ref: 6E12511D
                                          • VariantClear.OLEAUT32(?), ref: 6E125123
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 2515392200-0
                                          • Opcode ID: 50698cea9948d416ae2e20118cc5ba18561fd944ebc010cd85fb92e9e0723fef
                                          • Instruction ID: f59d5044550868f8d1016d2def971d8bd7eabd3666623e3084c6cace95651b93
                                          • Opcode Fuzzy Hash: 50698cea9948d416ae2e20118cc5ba18561fd944ebc010cd85fb92e9e0723fef
                                          • Instruction Fuzzy Hash: 31120475615705AFC758DBD8DD84DAAB3B9BF8D300F144668F50AABB91CA30F841CB90
                                          APIs
                                          • VariantInit.OLEAUT32(6E1805A8), ref: 6E1249EE
                                          • VariantInit.OLEAUT32(?), ref: 6E1249F7
                                          • VariantInit.OLEAUT32(?), ref: 6E1249FD
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E124A08
                                          • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E124A39
                                          • VariantClear.OLEAUT32(?), ref: 6E124A45
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E124B66
                                          • VariantClear.OLEAUT32(?), ref: 6E124B76
                                          • VariantClear.OLEAUT32(?), ref: 6E124B7C
                                          • VariantClear.OLEAUT32(6E1805A8), ref: 6E124B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 2515392200-0
                                          • Opcode ID: e2e5704f2908a10b62b142771465e6005f197571207b441818e93625072d95d3
                                          • Instruction ID: 146df9e1f225bc7dce2fbeca4ceb0efc816a0c5351489a33826dceace6c92f94
                                          • Opcode Fuzzy Hash: e2e5704f2908a10b62b142771465e6005f197571207b441818e93625072d95d3
                                          • Instruction Fuzzy Hash: B6515F76A002199FDB04DFE4CC84EAEB7BCFF89310F144569E915EB244D735A982DBA0
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12480C
                                          • VariantInit.OLEAUT32(?), ref: 6E124815
                                          • VariantInit.OLEAUT32(?), ref: 6E12481B
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E124826
                                          • SafeArrayPutElement.OLEAUT32(00000000,000000FF,?), ref: 6E12485B
                                          • VariantClear.OLEAUT32(?), ref: 6E124868
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E124974
                                          • VariantClear.OLEAUT32(?), ref: 6E124984
                                          • VariantClear.OLEAUT32(?), ref: 6E12498A
                                          • VariantClear.OLEAUT32(?), ref: 6E124990
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 2515392200-0
                                          • Opcode ID: 3d0bc766783f3a30ab5fa105e28ebe3a6c637b20446f3cb83e55082449982f60
                                          • Instruction ID: b1654122493f0c39eab85e5f73dd9801241cf86bddf71242c5e34e8055559aa0
                                          • Opcode Fuzzy Hash: 3d0bc766783f3a30ab5fa105e28ebe3a6c637b20446f3cb83e55082449982f60
                                          • Instruction Fuzzy Hash: 37514D729002499FDB14DFE4CC80EAEB7B9FF89310F14456DE506AB644DB30A986DB90
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E11DD00
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000003), ref: 6E11DD10
                                          • SafeArrayPutElement.OLEAUT32(00000000,6E122FFF,?), ref: 6E11DD47
                                          • VariantClear.OLEAUT32(?), ref: 6E11DD4F
                                          • SafeArrayPutElement.OLEAUT32(00000000,6E122FFF,?), ref: 6E11DD6D
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6E11DDA4
                                          • VariantClear.OLEAUT32(?), ref: 6E11DDAC
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E11DE16
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E11DE27
                                          • VariantClear.OLEAUT32(?), ref: 6E11DE31
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Variant$ClearElement$Destroy$CreateInitVector
                                          • String ID:
                                          • API String ID: 3525949229-0
                                          • Opcode ID: 6acfc880e8f563e01f4f6b980484e6762be59b9b5c844d40971e86e0d521fb34
                                          • Instruction ID: 1e8066d1d05bfcdb8081b4812e736b61bd7c3203bbcdd47f251a4ddd894e1070
                                          • Opcode Fuzzy Hash: 6acfc880e8f563e01f4f6b980484e6762be59b9b5c844d40971e86e0d521fb34
                                          • Instruction Fuzzy Hash: 0E516F75A05609AFDB00DFA4C884EDFBBB8FF5A701F118129EA1597350DB34A941DFA0
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E13C213
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                          • String ID: gfff$gfff$gfff$gfff$gfff$gfff$vector<T> too long
                                          • API String ID: 1823113695-1254974138
                                          • Opcode ID: 0264c04571b3cdcabfcd2070421550230ae816008af6d095e0e976b03d67afcc
                                          • Instruction ID: 7c28b01a0dab7e753ebbfbc7188e798ba3243b293ac4ceeae885af283f21c0e2
                                          • Opcode Fuzzy Hash: 0264c04571b3cdcabfcd2070421550230ae816008af6d095e0e976b03d67afcc
                                          • Instruction Fuzzy Hash: 76918A75A006099FC718CF99DC90EEEB7B9EB88314F14861DE559DB344E730B944CB91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                          • String ID: invalid string position$string too long
                                          • API String ID: 2168136238-4289949731
                                          • Opcode ID: 1776291ee44f0fe993de1fa567ddbdedef96f29b727657b53008b549c907640d
                                          • Instruction ID: ffb7e83263c3f281796660e3cc71759e405c1064a79a8e224d3c3eae78a70142
                                          • Opcode Fuzzy Hash: 1776291ee44f0fe993de1fa567ddbdedef96f29b727657b53008b549c907640d
                                          • Instruction Fuzzy Hash: 6851C631B181059BDB24CE9DD890ADFB7AADBC5310B20493EE955C7784E770ECE09791
                                          APIs
                                          • GetModuleHandleW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 6E131C5E
                                          • LoadLibraryW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 6E131C69
                                          • GetProcAddress.KERNEL32(00000000,F1F2E532), ref: 6E131CA2
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6E131CC1
                                          • LoadLibraryW.KERNEL32(kernel32.dll,?,00000000), ref: 6E131CCC
                                          • GetProcAddress.KERNEL32(00000000,EFF3E52B), ref: 6E131D0A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: AddressHandleLibraryLoadModuleProc
                                          • String ID: User32.dll$kernel32.dll
                                          • API String ID: 310444273-1965990335
                                          • Opcode ID: 1a77830f1d6e5bd7053f614f0041ebf8003a8a30d37e455496aea9858aad9067
                                          • Instruction ID: 423a6711968db2a5e8eaf4cb3d1ccca8d77c795515670f1320132fa603e17aec
                                          • Opcode Fuzzy Hash: 1a77830f1d6e5bd7053f614f0041ebf8003a8a30d37e455496aea9858aad9067
                                          • Instruction Fuzzy Hash: 1C616274204A108FD760CF98C581A9BBBF6FF46310F708918D5979BB42DB35E88AEB41
                                          APIs
                                          • UnDecorator::getArgumentList.LIBCMT ref: 6E17442E
                                            • Part of subcall function 6E173FC9: Replicator::operator[].LIBCMT ref: 6E17404C
                                            • Part of subcall function 6E173FC9: DName::operator+=.LIBCMT ref: 6E174054
                                          • DName::operator+.LIBCMT ref: 6E174487
                                          • DName::DName.LIBCMT ref: 6E1744DF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                          • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                          • API String ID: 834187326-2211150622
                                          • Opcode ID: 73b9ed1cb9eac15e441cb60cdbf16f8805e4c9cc8e95f35c30909d7c372964ae
                                          • Instruction ID: 60a0c3eac19874d4c312cbd3ea8ffeb07dff6df18d1d59988744de264c3144f2
                                          • Opcode Fuzzy Hash: 73b9ed1cb9eac15e441cb60cdbf16f8805e4c9cc8e95f35c30909d7c372964ae
                                          • Instruction Fuzzy Hash: 2A214CB46006099FCF11CF9CC4549A97BF5AB5A789B208195E86ADF316CB30D9C3FB50
                                          APIs
                                          • UnDecorator::UScore.LIBCMT ref: 6E175D40
                                          • DName::DName.LIBCMT ref: 6E175D4C
                                            • Part of subcall function 6E173B3B: DName::doPchar.LIBCMT ref: 6E173B6C
                                          • UnDecorator::getScopedName.LIBCMT ref: 6E175D8B
                                          • DName::operator+=.LIBCMT ref: 6E175D95
                                          • DName::operator+=.LIBCMT ref: 6E175DA4
                                          • DName::operator+=.LIBCMT ref: 6E175DB0
                                          • DName::operator+=.LIBCMT ref: 6E175DBD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                          • String ID: void
                                          • API String ID: 1480779885-3531332078
                                          • Opcode ID: 2f22e54701292201c54e715e4284b85470ea4c0481ed4c650da1705ed392fc02
                                          • Instruction ID: 038b804700363d3d384bb31ad27bd37cda146c288175fae7117ef2afc3e1db5c
                                          • Opcode Fuzzy Hash: 2f22e54701292201c54e715e4284b85470ea4c0481ed4c650da1705ed392fc02
                                          • Instruction Fuzzy Hash: 421182B0500208AFDF15DFE8C89CBEE7BB4EB11B05F004098D4559B2A5DB709EC6EB41
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E12C88F
                                          • VariantInit.OLEAUT32(?), ref: 6E12C895
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12C8A0
                                          • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E12C8D5
                                          • VariantClear.OLEAUT32(?), ref: 6E12C8E1
                                          • std::tr1::_Xweak.LIBCPMT ref: 6E12CB1C
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12CB39
                                          • VariantClear.OLEAUT32(?), ref: 6E12CB49
                                          • VariantClear.OLEAUT32(?), ref: 6E12CB4F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                          • String ID:
                                          • API String ID: 1774866819-0
                                          • Opcode ID: 7a7c963767d65d481c0f0fa58973e02fe823352a88f7c19e34c61109028fc4d3
                                          • Instruction ID: be145c923fbb5cc9c20345b9b288746d4e0e39bf79b92dbcedb70342a736cb38
                                          • Opcode Fuzzy Hash: 7a7c963767d65d481c0f0fa58973e02fe823352a88f7c19e34c61109028fc4d3
                                          • Instruction Fuzzy Hash: 96B13775600609AFCB14DF98CC84DEAB7F9BF8D310F158568E606AB791DA34F881DB60
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E123F7B
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E123F8D
                                          • VariantInit.OLEAUT32(?), ref: 6E123FB7
                                          • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E123FD0
                                          • VariantClear.OLEAUT32(?), ref: 6E1240C9
                                          • VariantClear.OLEAUT32(?), ref: 6E124105
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E124123
                                          • VariantClear.OLEAUT32(?), ref: 6E124157
                                          • VariantClear.OLEAUT32(?), ref: 6E124168
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ArrayClearSafe$Bound$DestroyElementInit
                                          • String ID:
                                          • API String ID: 758290628-0
                                          • Opcode ID: bf2ec36e2cf5ad3aacafdc049254629451db0e3c8abe8af6b8d5258c7d922882
                                          • Instruction ID: 5e9cf6111d3b6b4d9924745a645c376e79dde298608b7dcdf4ac5c7a3a399a1e
                                          • Opcode Fuzzy Hash: bf2ec36e2cf5ad3aacafdc049254629451db0e3c8abe8af6b8d5258c7d922882
                                          • Instruction Fuzzy Hash: B0716D761083429FC700DFA8C8C499BBBE9FB99700F144A2CF59587250D775E9C6DB92
                                          APIs
                                          • UnmapViewOfFile.KERNEL32(00000000,?,?,00000000,4F740BFF), ref: 6E10FC98
                                          • CloseHandle.KERNEL32(FFFFFFFF,?,?,00000000,4F740BFF), ref: 6E10FCAD
                                          • CloseHandle.KERNEL32(?,?,?,00000000,4F740BFF), ref: 6E10FCB7
                                          • SetLastError.KERNEL32(00000000,?,?,00000000,4F740BFF), ref: 6E10FCBA
                                          • CreateFileW.KERNEL32(?,-00000001,00000001,00000000,00000003,00000000,00000000,?,?,00000000,4F740BFF), ref: 6E10FD01
                                          • GetFileSizeEx.KERNEL32(00000000,?,?,?,00000000,4F740BFF), ref: 6E10FD14
                                          • GetLastError.KERNEL32(?,?,00000000,4F740BFF), ref: 6E10FD2A
                                          • CreateFileMappingW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,00000000,4F740BFF), ref: 6E10FD6B
                                          • MapViewOfFile.KERNEL32(00000000,?,00000000,00000000,00000000,?,?,00000000,4F740BFF), ref: 6E10FD98
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateErrorHandleLastView$MappingSizeUnmap
                                          • String ID:
                                          • API String ID: 1303881157-0
                                          • Opcode ID: 056fb4d94bb57d3d065df235a590442e75454e7614ec3043ee552158933cf788
                                          • Instruction ID: 603e2e369dcb97a2a2f2479f9a02e3b4ed53b5d43db1acbca5ad16f5e9a9881d
                                          • Opcode Fuzzy Hash: 056fb4d94bb57d3d065df235a590442e75454e7614ec3043ee552158933cf788
                                          • Instruction Fuzzy Hash: C851D6B56043019FDB408F74C896B9B77A8AB4D320F358659EC24CF2C5DF74D882ABA4
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E1642DD
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E164363
                                          • _memmove.LIBCMT ref: 6E164381
                                          • _memmove.LIBCMT ref: 6E1643E6
                                          • _memmove.LIBCMT ref: 6E164453
                                          • _memmove.LIBCMT ref: 6E164474
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 4034224661-3788999226
                                          • Opcode ID: 4b6aeee1ebd4a23ae7ed81b4484d9d45ec07c23dbcb5de6a04ed0259e1e9fdb7
                                          • Instruction ID: e7e140d4c3892a2477634386536e7fc8bcc5084c46df37886aea4bb34e3ee772
                                          • Opcode Fuzzy Hash: 4b6aeee1ebd4a23ae7ed81b4484d9d45ec07c23dbcb5de6a04ed0259e1e9fdb7
                                          • Instruction Fuzzy Hash: 0551C0B27043028FC718CFA8DC94D6BB7E9EBD4214F184E2DE896C3344E671E945C6A1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                          • String ID: invalid string position$string too long
                                          • API String ID: 2168136238-4289949731
                                          • Opcode ID: 0acac290d178e253c040d52d58d2356ce6d5d77667f4a0deda6515d6d2ca5980
                                          • Instruction ID: 0c2d89591d97da3ae60b266b2338374adcb21457974d1407b437d1d709a85004
                                          • Opcode Fuzzy Hash: 0acac290d178e253c040d52d58d2356ce6d5d77667f4a0deda6515d6d2ca5980
                                          • Instruction Fuzzy Hash: 5341D4323042218FE724CE9DE890E6EF3EAEB95714B710D1EE152C7794C7629CC69761
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RSDi
                                          • API String ID: 4225690600-559181253
                                          • Opcode ID: 8575ed201db9583555cdeb3242fca2843b550241517ef6415b06738031229768
                                          • Instruction ID: 024126941bad435763f70103ddf27b3729850b62f5277daf765ccf794e224995
                                          • Opcode Fuzzy Hash: 8575ed201db9583555cdeb3242fca2843b550241517ef6415b06738031229768
                                          • Instruction Fuzzy Hash: A0413974A006099FDB40CFA9CD90E5EB7FAAF99300F60869AE509DB355DB31E881DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RSUa
                                          • API String ID: 4225690600-2086061799
                                          • Opcode ID: e5060edf4871e8457d5baa4b565d7dd669d34a9a751a9d3f97010fe81d8cce0d
                                          • Instruction ID: 63b2760b307bcaeaac47fdd804c49c11a166aa422075daae9ae41f28b1795b44
                                          • Opcode Fuzzy Hash: e5060edf4871e8457d5baa4b565d7dd669d34a9a751a9d3f97010fe81d8cce0d
                                          • Instruction Fuzzy Hash: 58314870E006099FDB40CFA9CD90B9EB7B9AF99300F20869AE418E7251DB71E9C1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RSqb
                                          • API String ID: 4225690600-347567867
                                          • Opcode ID: 42666d571609ab911d3549f8b0994194baaf34d35f6d3edb02bc90efb8018112
                                          • Instruction ID: 4bda4166469ca020de05308dac64174f9b9b2f790a2d21496cca53874f5006b8
                                          • Opcode Fuzzy Hash: 42666d571609ab911d3549f8b0994194baaf34d35f6d3edb02bc90efb8018112
                                          • Instruction Fuzzy Hash: FB314B70E006099FCB40CFA9CD90B9EB7B9AF99300F208596E418E7251DB75D9C1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RSa
                                          • API String ID: 4225690600-3169278968
                                          • Opcode ID: b1fe2efd251a2831e527ccca006329b13c1c8479a5d384352ee739502a14e031
                                          • Instruction ID: e486220684a7cdcb32117ddf889a4692155c2f6c4c8f8b3374298c005c6ce249
                                          • Opcode Fuzzy Hash: b1fe2efd251a2831e527ccca006329b13c1c8479a5d384352ee739502a14e031
                                          • Instruction Fuzzy Hash: BC314B70E106099FCB40CFA9CD90B9EB7B9AF99300F2085AAE418E7251DB71E9C1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RS3g
                                          • API String ID: 4225690600-2794631155
                                          • Opcode ID: 8582385c92e6cee54f3ef8fc43261b2dce55b9f6c98707734954fed16981a6b0
                                          • Instruction ID: 1b47d6b3e9882538a06abc9b3ea0bd48fe8a57e17aa6d28aebc164d230f38707
                                          • Opcode Fuzzy Hash: 8582385c92e6cee54f3ef8fc43261b2dce55b9f6c98707734954fed16981a6b0
                                          • Instruction Fuzzy Hash: 1D314B70E106099FCB40CFA9CD90B9EB7F9AF99200F2086A6E418E7255DB71E9C1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RS:h
                                          • API String ID: 4225690600-3891202347
                                          • Opcode ID: 6089819031c0e7c4d4d681d5eeb9e3f531c6871b5041c7fd51766367a8fe1c64
                                          • Instruction ID: a2c9c3871de819001dd36c7a6989e3c94abeb2e05e62c28f61eacf88bd294b17
                                          • Opcode Fuzzy Hash: 6089819031c0e7c4d4d681d5eeb9e3f531c6871b5041c7fd51766367a8fe1c64
                                          • Instruction Fuzzy Hash: 5B313B70E006099FDB40CFA9CD90B9EB7B9AF99200F2085A6E418E7255DB75EDC1DF50
                                          APIs
                                          • type_info::operator!=.LIBCMT ref: 6E15C7EB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: type_info::operator!=
                                          • String ID: ModPrime1PrivateExponent$ModPrime2PrivateExponent$MultiplicativeInverseOfPrime2ModPrime1$Prime1$Prime2$PrivateExponent
                                          • API String ID: 2241493438-339133643
                                          • Opcode ID: 659ca8f2249571f50281ee8a5fe93a306ef4301838112e538fa066f2599df11a
                                          • Instruction ID: 1628b446260f1dd477c82ab4125836cc2b86d59c870bd2f34f7c6f98115ebf2a
                                          • Opcode Fuzzy Hash: 659ca8f2249571f50281ee8a5fe93a306ef4301838112e538fa066f2599df11a
                                          • Instruction Fuzzy Hash: 7A316CB0A143458FC700DFB8C85558BBBE5AFD5204F044A6EF565AF360EB70D898DB82
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID: RS%e
                                          • API String ID: 4225690600-1409579784
                                          • Opcode ID: 6a51ed9379e67d3de901809ee5ecb4eda26130a33eebe48e32bbb5dea7cb8f5c
                                          • Instruction ID: f4c9e79f1d0ca8619029572bb522741e614763762ae55e587a68debd44cfb0c2
                                          • Opcode Fuzzy Hash: 6a51ed9379e67d3de901809ee5ecb4eda26130a33eebe48e32bbb5dea7cb8f5c
                                          • Instruction Fuzzy Hash: 3C314970E106189FCB10CBA9CC90B9DB7BAAF99300F2086AAE418E7251DB75DDC0DF50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID:
                                          • API String ID: 2610073882-0
                                          • Opcode ID: a025ae15969f51bfa1adbcb3dab2d0c326f1e1a83ddfbda63c78345fc9ee7101
                                          • Instruction ID: 3c26095c5ca33a5ff0e73aaaa12cc9743cdc923e2ecb677223e9304212384295
                                          • Opcode Fuzzy Hash: a025ae15969f51bfa1adbcb3dab2d0c326f1e1a83ddfbda63c78345fc9ee7101
                                          • Instruction Fuzzy Hash: 3AC149716087419FC300DF98C880A9BBBE9FFD8304F648A5DF5948B265D735E889DB92
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E119DEB
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E119DFB
                                          • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E119E29
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E119F25
                                          • VariantClear.OLEAUT32(?), ref: 6E119FE5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                          • String ID: @
                                          • API String ID: 3214203402-2766056989
                                          • Opcode ID: 058163b3250464a5863a2febcd79a74e7430111c1335a74fcb097e7d3c976235
                                          • Instruction ID: 0ec8238f964c6e7ae9ba887b42df6b908bf072386dd9334956df5dcb5db89d14
                                          • Opcode Fuzzy Hash: 058163b3250464a5863a2febcd79a74e7430111c1335a74fcb097e7d3c976235
                                          • Instruction Fuzzy Hash: 28D16A71D0824A9FDF00DFE8C890ADDBBB6BF49304F24856DE525AB244D731AA85DB90
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E11B3EB
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E11B3FB
                                          • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E11B429
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E11B525
                                          • VariantClear.OLEAUT32(?), ref: 6E11B5E5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                          • String ID: @
                                          • API String ID: 3214203402-2766056989
                                          • Opcode ID: 3b021f3331312ce24d173514ed8255364857a98c63af03e38b645443ce0352b6
                                          • Instruction ID: 4d8d9e96267e2abc503b16521f70ecebdabb92d70942e88ac8cce66144394bcc
                                          • Opcode Fuzzy Hash: 3b021f3331312ce24d173514ed8255364857a98c63af03e38b645443ce0352b6
                                          • Instruction Fuzzy Hash: CBD16A71E0424ACFDB00DFE8C890AEDBBB5BF58304F648569E515AB358D730AA85DF90
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E1416B2
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • __CxxThrowException@8.LIBCMT ref: 6E14180A
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          Strings
                                          • exceeds the maximum of , xrefs: 6E14173F
                                          • : message length of , xrefs: 6E14170D
                                          • for this public key, xrefs: 6E141771
                                          • : this key is too short to encrypt any messages, xrefs: 6E14162A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaiseXinvalid_argumentstd::_
                                          • String ID: exceeds the maximum of $ for this public key$: message length of $: this key is too short to encrypt any messages
                                          • API String ID: 3807434085-412673420
                                          • Opcode ID: 8e3b89c62b936d1064dee845b0adb7fa5ba1da10d4c548f9396e2b686af5b17c
                                          • Instruction ID: ffea2049aac36e5b931a5c750dc77d27d96bbe5a3d7f1eb30c6f1bba2d85c069
                                          • Opcode Fuzzy Hash: 8e3b89c62b936d1064dee845b0adb7fa5ba1da10d4c548f9396e2b686af5b17c
                                          • Instruction Fuzzy Hash: 42B15D712083809FD320DBA9C890FDBBBE9AFD9314F04891DE19D87351DB70A9459BA3
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E16126E
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E1612E0
                                          • _memmove.LIBCMT ref: 6E161305
                                          • _memmove.LIBCMT ref: 6E161342
                                          • _memmove.LIBCMT ref: 6E16135F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                          • String ID: deque<T> too long
                                          • API String ID: 4034224661-309773918
                                          • Opcode ID: 5a80f78740d9fc5a7b47b2c1451bad4d167a11929f8cbfe346603447a338e10e
                                          • Instruction ID: c765adb078b0c90367258fcae2ea5e32b1b7ce2fca3249a9240dc8d82926f7bc
                                          • Opcode Fuzzy Hash: 5a80f78740d9fc5a7b47b2c1451bad4d167a11929f8cbfe346603447a338e10e
                                          • Instruction Fuzzy Hash: 7F410872B042014BD704CFA8DC9066BB7EAEBD4220F198A2CE809D7354FA34ED59C7A1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E1613BE
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E161431
                                          • _memmove.LIBCMT ref: 6E161456
                                          • _memmove.LIBCMT ref: 6E161493
                                          • _memmove.LIBCMT ref: 6E1614B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                          • String ID: deque<T> too long
                                          • API String ID: 4034224661-309773918
                                          • Opcode ID: 2c429fafd9e564acc290f530f60762cd60a714ee35ffa7f2358f94a8698cfcd1
                                          • Instruction ID: 4f8ecfc1882984b5be0eb6bac30d872f8b1bd381944dea2a51b6545c2c246e56
                                          • Opcode Fuzzy Hash: 2c429fafd9e564acc290f530f60762cd60a714ee35ffa7f2358f94a8698cfcd1
                                          • Instruction Fuzzy Hash: 3141E472B042054BD704CFA8DC9196BB7EAABD4220F198A2CE809D7344FB34ED5987A1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104DA9
                                            • Part of subcall function 6E169125: std::exception::exception.LIBCMT ref: 6E16913A
                                            • Part of subcall function 6E169125: __CxxThrowException@8.LIBCMT ref: 6E16914F
                                            • Part of subcall function 6E169125: std::exception::exception.LIBCMT ref: 6E169160
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104DCA
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104DE5
                                          • _memmove.LIBCMT ref: 6E104E4D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                          • String ID: invalid string position$string too long
                                          • API String ID: 443534600-4289949731
                                          • Opcode ID: 915eaae791ed93fff8d70cf6a4543f267c49d2ac26499ba019da3b0e842ab89e
                                          • Instruction ID: 762646bde3ea818777dbded75c7dcb01c52ca322687605f405732a3a0e611e76
                                          • Opcode Fuzzy Hash: 915eaae791ed93fff8d70cf6a4543f267c49d2ac26499ba019da3b0e842ab89e
                                          • Instruction Fuzzy Hash: D431CA323042158FD724CEDCE8D0A5AF3E9ABB4725B200A2EE552CB740DB71D8C1D791
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Name::operator+$NameName::
                                          • String ID: throw(
                                          • API String ID: 168861036-3159766648
                                          • Opcode ID: 488aaa6b43221776043800bb19772460f7e0527982c2f32c15531d7cb3f66107
                                          • Instruction ID: 614a5629c185db6e5aef17344e232fcf0b1ccdb5a81b57368b9997c8a7ce2c64
                                          • Opcode Fuzzy Hash: 488aaa6b43221776043800bb19772460f7e0527982c2f32c15531d7cb3f66107
                                          • Instruction Fuzzy Hash: D10180B0610109AFCF14DFE8C859DEE7BB9EB48B08F404455E9019B294DB30A987AB90
                                          APIs
                                          • __getptd_noexit.LIBCMT ref: 6E16CCFA
                                            • Part of subcall function 6E16EA6D: GetLastError.KERNEL32(?,?,6E16D7DD,6E169DEF,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E16EA71
                                            • Part of subcall function 6E16EA6D: ___set_flsgetvalue.LIBCMT ref: 6E16EA7F
                                            • Part of subcall function 6E16EA6D: __calloc_crt.LIBCMT ref: 6E16EA93
                                            • Part of subcall function 6E16EA6D: DecodePointer.KERNEL32(00000000,?,?,6E16D7DD,6E169DEF,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E16EAAD
                                            • Part of subcall function 6E16EA6D: GetCurrentThreadId.KERNEL32 ref: 6E16EAC3
                                            • Part of subcall function 6E16EA6D: SetLastError.KERNEL32(00000000,?,?,6E16D7DD,6E169DEF,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E16EADB
                                          • __calloc_crt.LIBCMT ref: 6E16CD1C
                                          • __get_sys_err_msg.LIBCMT ref: 6E16CD3A
                                          • _strcpy_s.LIBCMT ref: 6E16CD42
                                          • __invoke_watson.LIBCMT ref: 6E16CD57
                                          Strings
                                          • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 6E16CD07, 6E16CD2A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                                          • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                          • API String ID: 3117964792-798102604
                                          • Opcode ID: a6dc3a7cfef7509be9af599571e784deb4ac0a51eb71081e249d338232531d70
                                          • Instruction ID: 57c97fe7a3a21bc998c582e3dda201c8f2af0ebd3eb0429e7852d0ccb1b100de
                                          • Opcode Fuzzy Hash: a6dc3a7cfef7509be9af599571e784deb4ac0a51eb71081e249d338232531d70
                                          • Instruction Fuzzy Hash: 0BF02B736043242BCB1065E99C8099F7BAD9B91768B610C3AF50CBF100E6259CE075D4
                                          APIs
                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6E199880,00000008,6E16EAC1,00000000,00000000,?,?,6E16D7DD,6E169DEF,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E16E9CA
                                          • __lock.LIBCMT ref: 6E16E9FE
                                            • Part of subcall function 6E172438: __mtinitlocknum.LIBCMT ref: 6E17244E
                                            • Part of subcall function 6E172438: __amsg_exit.LIBCMT ref: 6E17245A
                                            • Part of subcall function 6E172438: EnterCriticalSection.KERNEL32(6E169BD4,6E169BD4,?,6E16EA03,0000000D), ref: 6E172462
                                          • InterlockedIncrement.KERNEL32(FFFFFEF5), ref: 6E16EA0B
                                          • __lock.LIBCMT ref: 6E16EA1F
                                          • ___addlocaleref.LIBCMT ref: 6E16EA3D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                          • String ID: KERNEL32.DLL
                                          • API String ID: 637971194-2576044830
                                          • Opcode ID: 249c62e4f43825e20369b2bf0b25965101b35c6e5cfdea3527ddec802362d61b
                                          • Instruction ID: 213b31c79ae176d3f061daa71c9fe8be5541a8a8bdf2227e95db676efc60d165
                                          • Opcode Fuzzy Hash: 249c62e4f43825e20369b2bf0b25965101b35c6e5cfdea3527ddec802362d61b
                                          • Instruction Fuzzy Hash: 6F015EB1445B00DED720DFA9C80478ABBE4AF41318F20890DD596976A0CB74A685EF11
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6E11E29B
                                          • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6E11E2B6
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6E11E2D7
                                            • Part of subcall function 6E125760: std::tr1::_Xweak.LIBCPMT ref: 6E125769
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E11E309
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E11E523
                                          • InterlockedCompareExchange.KERNEL32(6E1AC6A4,45524548,4B4F4F4C), ref: 6E11E544
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                          • String ID:
                                          • API String ID: 2722669376-0
                                          • Opcode ID: 4853704c45be80ebaabac84d736e535437776f1b5714461eda5bae01139397dd
                                          • Instruction ID: 6571242805acadd0c71edea3579325133d702ac836bbdd551e02ab0bdaec85fb
                                          • Opcode Fuzzy Hash: 4853704c45be80ebaabac84d736e535437776f1b5714461eda5bae01139397dd
                                          • Instruction Fuzzy Hash: E7D1B2B1A042059FDB50CFE4C894BDE77B9AF45304F148479E506EB680E774EA84EBA1
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 8575ed201db9583555cdeb3242fca2843b550241517ef6415b06738031229768
                                          • Instruction ID: 319635170ad5031f8be7d99318c36930e9370192bc250ae57932f5606a02becd
                                          • Opcode Fuzzy Hash: 8575ed201db9583555cdeb3242fca2843b550241517ef6415b06738031229768
                                          • Instruction Fuzzy Hash: 3A416974A006099FCB40CFA9CD90A5EB7FAAF99300F20859AE509DB355DB31EC82DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 85e507a8463ffd4a6748bc765af54c657c09be3e32b58f2a3140d9dba0715729
                                          • Instruction ID: 5306580b0f624b24038678f878333de114e39715079d8dc02e3b781de2cca5c7
                                          • Opcode Fuzzy Hash: 85e507a8463ffd4a6748bc765af54c657c09be3e32b58f2a3140d9dba0715729
                                          • Instruction Fuzzy Hash: 3B415D70A006199FDB00DFA8CC90B9EB7B9AF99200F2085A6E518E7255DB31E981DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 85e507a8463ffd4a6748bc765af54c657c09be3e32b58f2a3140d9dba0715729
                                          • Instruction ID: 4b54e632e2aee74d0bc9db8216310714cb50830870fb4ddf3c27738a3c5a0ea5
                                          • Opcode Fuzzy Hash: 85e507a8463ffd4a6748bc765af54c657c09be3e32b58f2a3140d9dba0715729
                                          • Instruction Fuzzy Hash: 7B415E70A006099FCB40CFA9CD90F9EB7F9AF99200F2086A6E518E7255DB31DD81DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 65b6b91cf78f3e2b8ebcf331e3c549afdf09368bad5f44631a283b9a01686c5c
                                          • Instruction ID: 359a05ea4232b146f3bb4a34eb65d7523f17ab8881b1244e09ba1f756e56920a
                                          • Opcode Fuzzy Hash: 65b6b91cf78f3e2b8ebcf331e3c549afdf09368bad5f44631a283b9a01686c5c
                                          • Instruction Fuzzy Hash: 82313970A006099FCB40CFA8CC90B9EB7BAAF99200F208596E519E7255DB75ED81DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 8582385c92e6cee54f3ef8fc43261b2dce55b9f6c98707734954fed16981a6b0
                                          • Instruction ID: 5d7e251cc2b7357366b6365fd5bf265dd2144f86da435038a38037793fcd3d99
                                          • Opcode Fuzzy Hash: 8582385c92e6cee54f3ef8fc43261b2dce55b9f6c98707734954fed16981a6b0
                                          • Instruction Fuzzy Hash: 52315C70E006099FCB40CFA8CD90B9EB7B9AF99200F208696E419E7255DB71EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 6089819031c0e7c4d4d681d5eeb9e3f531c6871b5041c7fd51766367a8fe1c64
                                          • Instruction ID: 660d5d45bc287953778f224b89d4cf81f4b39a9cd3f3b0f4f4a74be881e57e72
                                          • Opcode Fuzzy Hash: 6089819031c0e7c4d4d681d5eeb9e3f531c6871b5041c7fd51766367a8fe1c64
                                          • Instruction Fuzzy Hash: A9315A70E006099FCB00CFA8CC90B9EB7B9AF99200F20859AE419E7255DB75EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 9884b3cae87280f6e1786e76c9dfee5cc7891abbd7c23a3a9010c9ff41f1f51e
                                          • Instruction ID: 113658e689768bb799b9b08278e7c16993db8d4950fd5ccc3fd2f3383490c632
                                          • Opcode Fuzzy Hash: 9884b3cae87280f6e1786e76c9dfee5cc7891abbd7c23a3a9010c9ff41f1f51e
                                          • Instruction Fuzzy Hash: 70314C70E106099FCB40CFA9CD90B9EB7B9AF99200F2085A6E418E7251DB71D9C0DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 65b6b91cf78f3e2b8ebcf331e3c549afdf09368bad5f44631a283b9a01686c5c
                                          • Instruction ID: b045fd338865f7af93626e53971d950aee296f4cf8a22acff9ebb087343575fa
                                          • Opcode Fuzzy Hash: 65b6b91cf78f3e2b8ebcf331e3c549afdf09368bad5f44631a283b9a01686c5c
                                          • Instruction Fuzzy Hash: 32314870E106099FCB40CFA9CC90B9EB7B9AF99200F20859AE418EB251DB75E9C1DB50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: ed9382c9c509efe487270c0ba6b18faf8a0ce449122af25062c27c0892664562
                                          • Instruction ID: c086a54bf8a16ee97595cb04387c89b7b1ef33043ce0e2354e64c6da19842618
                                          • Opcode Fuzzy Hash: ed9382c9c509efe487270c0ba6b18faf8a0ce449122af25062c27c0892664562
                                          • Instruction Fuzzy Hash: B1313D70E106199FCB40CFA9CD90B9EB7B9AF99200F208596E418E7251D775DDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: b1fe2efd251a2831e527ccca006329b13c1c8479a5d384352ee739502a14e031
                                          • Instruction ID: a37753d1cd6411c180f75a630cc5343f11692268fd3becfd5129833e4b941455
                                          • Opcode Fuzzy Hash: b1fe2efd251a2831e527ccca006329b13c1c8479a5d384352ee739502a14e031
                                          • Instruction Fuzzy Hash: 36314870A006099FCB40DFA8CC90B9EB7B9AF99200F20859AE419EB251DB75E981DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: e5060edf4871e8457d5baa4b565d7dd669d34a9a751a9d3f97010fe81d8cce0d
                                          • Instruction ID: 6a56b87ae9208a2c2df53831320e2737b940c595bdca9988399d9662b95f40ec
                                          • Opcode Fuzzy Hash: e5060edf4871e8457d5baa4b565d7dd669d34a9a751a9d3f97010fe81d8cce0d
                                          • Instruction Fuzzy Hash: B3313970A006199FCB40CBA8CD90B9EB7B9AF99200F208596E419E7255DB75EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: ed9382c9c509efe487270c0ba6b18faf8a0ce449122af25062c27c0892664562
                                          • Instruction ID: 57bd9fce65f414a3322ce55ace2ef5e3d4d6ab8b87e4b2d9763e029918893486
                                          • Opcode Fuzzy Hash: ed9382c9c509efe487270c0ba6b18faf8a0ce449122af25062c27c0892664562
                                          • Instruction Fuzzy Hash: FE314970E006199FCB40CFA8CD90B9EB7BDAF99200F20859AE518EB251DB35ED81DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 9884b3cae87280f6e1786e76c9dfee5cc7891abbd7c23a3a9010c9ff41f1f51e
                                          • Instruction ID: 5ee93f8606412d227af1234366ee5be84df16d41db8295c08c2d69efeb18e4fd
                                          • Opcode Fuzzy Hash: 9884b3cae87280f6e1786e76c9dfee5cc7891abbd7c23a3a9010c9ff41f1f51e
                                          • Instruction Fuzzy Hash: 1B314B70A006099FCB40CFA9CD90B9EB7B9AF99200F2085A6E419E7251DB71E981DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 42666d571609ab911d3549f8b0994194baaf34d35f6d3edb02bc90efb8018112
                                          • Instruction ID: bca2466b68d4490a683c5e2cdcd19f12521c67219aacad01e0087499516ef5b1
                                          • Opcode Fuzzy Hash: 42666d571609ab911d3549f8b0994194baaf34d35f6d3edb02bc90efb8018112
                                          • Instruction Fuzzy Hash: 69315970E006099FCB40CFA9CD90B9EB7B9AF99200F20859AE419EB255DB75EDC1DF50
                                          APIs
                                          • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E12C180
                                          • SafeArrayPutElement.OLEAUT32(00000000,6E123749,?), ref: 6E12C1B8
                                          • VariantClear.OLEAUT32(?), ref: 6E12C1C4
                                          • VariantCopy.OLEAUT32(6E123749,?), ref: 6E12C21B
                                          • VariantClear.OLEAUT32(?), ref: 6E12C22F
                                          • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E12C23E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafeVariant$Clear$CopyCreateDestroyElementVector
                                          • String ID:
                                          • API String ID: 3979206172-0
                                          • Opcode ID: 32f9c1497acba4b48abad3d8ea283e006b58f5d734872c1ecbbbfbfe4073fdc9
                                          • Instruction ID: 7f1be54cd9029739541db88c57249d0959eb51b25610f59fb426dc2147307a0d
                                          • Opcode Fuzzy Hash: 32f9c1497acba4b48abad3d8ea283e006b58f5d734872c1ecbbbfbfe4073fdc9
                                          • Instruction Fuzzy Hash: F0313B75A04609AFDB00DFE8C894B9FBBB8EF9A700F108529E915D7350EA35E941DB60
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • InitializeCriticalSection.KERNEL32(00000000,?,00000000,00000000,6E1811FD,000000FF,?,6E118B80,00000000,?,00000000,?,6E118C13,?,?), ref: 6E117415
                                          • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000,6E1811FD,000000FF,?,6E118B80,00000000,?,00000000,?,6E118C13,?,?), ref: 6E11741B
                                          • std::exception::exception.LIBCMT ref: 6E11743D
                                          • __CxxThrowException@8.LIBCMT ref: 6E117452
                                          • std::exception::exception.LIBCMT ref: 6E117461
                                          • __CxxThrowException@8.LIBCMT ref: 6E117476
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$CriticalInitializeSection$_malloc
                                          • String ID:
                                          • API String ID: 189561132-0
                                          • Opcode ID: 0334e9e288282740922530b98912fca2966c769f2999ded52ef0ca229fc7f074
                                          • Instruction ID: a62e1ff34bfb25f17a65ef7749638390fb37080876617e17ab6269d66342c60c
                                          • Opcode Fuzzy Hash: 0334e9e288282740922530b98912fca2966c769f2999ded52ef0ca229fc7f074
                                          • Instruction Fuzzy Hash: 9C3177B2904A489FC750CFA9C880A9BFBF8FF59310B44895EE85697B40E730E544DBA1
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: a5e55b7d3e8422c7111596a877a9bb2a045764b9ff92da8ed8641a59a023164e
                                          • Instruction ID: 38ba6ced7d3a54af0a9923a2d626ef52206a22520b7a40cc54758482ab0c2e04
                                          • Opcode Fuzzy Hash: a5e55b7d3e8422c7111596a877a9bb2a045764b9ff92da8ed8641a59a023164e
                                          • Instruction Fuzzy Hash: 1D313A70E006189FCB50DFA8CC94B9EB7B9AF99200F20869AE419E7255DB71EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 6a51ed9379e67d3de901809ee5ecb4eda26130a33eebe48e32bbb5dea7cb8f5c
                                          • Instruction ID: 0472258644d1152e67f418cd6e8168acad5d9873864e859d7b4a06b39e1ce25e
                                          • Opcode Fuzzy Hash: 6a51ed9379e67d3de901809ee5ecb4eda26130a33eebe48e32bbb5dea7cb8f5c
                                          • Instruction Fuzzy Hash: 80315A70E006189FCB10CBA8CC90B9EB7BAAF99300F2085AAE419E7245C771EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 072d6e20a41f73a9333307eaf050ef1b0e219e17f736bc2dd4340cc894776344
                                          • Instruction ID: 8d5de64a4e05d764392be491ff9c90bf231ce0c80d19fa72d8273694ebaf662d
                                          • Opcode Fuzzy Hash: 072d6e20a41f73a9333307eaf050ef1b0e219e17f736bc2dd4340cc894776344
                                          • Instruction Fuzzy Hash: 80315C70E006189FDB50DBA8CC90B9EB7BDAF99200F24859AE419E7245C771EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: fca08f89501372161ac239a06800a3c1e13ffe0ddee686fd2617fa9761e57ee7
                                          • Instruction ID: 1b9d379e51b975c2b09b2889d5ebc903e197c3ed3d6070819729c9718dc3ba0b
                                          • Opcode Fuzzy Hash: fca08f89501372161ac239a06800a3c1e13ffe0ddee686fd2617fa9761e57ee7
                                          • Instruction Fuzzy Hash: 66313C70E006189FCB50CFA8CC94B9EB7B9AF99200F20869AE419E7255D771EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: bc17a72e3ee3fd46765208137caf8765d599724cf7902454a19af4a643917bf9
                                          • Instruction ID: a707689aad4ed5b372fd564019df2f9c91fe2adf7537e92f45a146956751f0b1
                                          • Opcode Fuzzy Hash: bc17a72e3ee3fd46765208137caf8765d599724cf7902454a19af4a643917bf9
                                          • Instruction Fuzzy Hash: D3316A70E006189FCB50CBA8CC90B9EB7BEAF99200F20859AE419E7241CB71EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: ae1e49702d57e2c58a8a18c2030d8026d2ead57c17554b0d0101def587121dd5
                                          • Instruction ID: 759cbce9356a2a5833efee58d916cfe526be745356fcfa6dd6b8c07beb9ba7ca
                                          • Opcode Fuzzy Hash: ae1e49702d57e2c58a8a18c2030d8026d2ead57c17554b0d0101def587121dd5
                                          • Instruction Fuzzy Hash: 1C313A70E006189FDB50CBA9CC90B9EB7BAAF99200F20859AE419E7245D771EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 3740cd0e5aa28189721df79c3d0480436b7469dd97eeb2913f0896c582267e59
                                          • Instruction ID: ae5c1410354a20284f75f5efea05ea88990a944ce98744cc47564881464ad0b4
                                          • Opcode Fuzzy Hash: 3740cd0e5aa28189721df79c3d0480436b7469dd97eeb2913f0896c582267e59
                                          • Instruction Fuzzy Hash: 2F3149B0E106189FCB50CBA9CD90B9EB7B9AF99200F20869AE418E7251DB71D9C0DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: fca08f89501372161ac239a06800a3c1e13ffe0ddee686fd2617fa9761e57ee7
                                          • Instruction ID: 2f62cb213756ec852d490470a0bd994f80933949fde47ce56e20d0118934e972
                                          • Opcode Fuzzy Hash: fca08f89501372161ac239a06800a3c1e13ffe0ddee686fd2617fa9761e57ee7
                                          • Instruction Fuzzy Hash: 04314970E106189FCB10CFA9CC90B9DB7B9AF99200F6086AAE419E7245DB71EDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: a5e55b7d3e8422c7111596a877a9bb2a045764b9ff92da8ed8641a59a023164e
                                          • Instruction ID: cee4992302484de128083166364388db6ec3546722d027fc46ec1e9e5c376be5
                                          • Opcode Fuzzy Hash: a5e55b7d3e8422c7111596a877a9bb2a045764b9ff92da8ed8641a59a023164e
                                          • Instruction Fuzzy Hash: 22315A70E106189FCB10CFA9CC90B9DB7B9AF99200F6086AAE418E7255DB71EDC0DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: bc17a72e3ee3fd46765208137caf8765d599724cf7902454a19af4a643917bf9
                                          • Instruction ID: efeff4b9d37cefb7f0a42c688ae06bc4b09f1e20477f687bfde32ced071a4c31
                                          • Opcode Fuzzy Hash: bc17a72e3ee3fd46765208137caf8765d599724cf7902454a19af4a643917bf9
                                          • Instruction Fuzzy Hash: 05312970E106189FCB50CBA9CC90B9DB7BAAF99200F20869AE418E7251DB75DDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 072d6e20a41f73a9333307eaf050ef1b0e219e17f736bc2dd4340cc894776344
                                          • Instruction ID: dd8873ef4567cb21a356f9cc0762b409747830a3fcb543882171262cd894ab8e
                                          • Opcode Fuzzy Hash: 072d6e20a41f73a9333307eaf050ef1b0e219e17f736bc2dd4340cc894776344
                                          • Instruction Fuzzy Hash: F3315C70E106189FDB50DFA9CC90B9DB7BAAF99200F2085AAE418E7241DB71DDC1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: ae1e49702d57e2c58a8a18c2030d8026d2ead57c17554b0d0101def587121dd5
                                          • Instruction ID: 1c047699e232752dc814b14474ea4918d2496e82c3a5d43554649c04ec8abed6
                                          • Opcode Fuzzy Hash: ae1e49702d57e2c58a8a18c2030d8026d2ead57c17554b0d0101def587121dd5
                                          • Instruction Fuzzy Hash: 13312970E106189FCB50CFA9CD80B9DB7B9AF99200F20859AE418EB241CB71E9C1DF50
                                          APIs
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArrayDestroySafe
                                          • String ID:
                                          • API String ID: 4225690600-0
                                          • Opcode ID: 3740cd0e5aa28189721df79c3d0480436b7469dd97eeb2913f0896c582267e59
                                          • Instruction ID: 84b0079a34aabb3708cc10596d4daab57f8a9a6b6e31c6870423cb2a07eff837
                                          • Opcode Fuzzy Hash: 3740cd0e5aa28189721df79c3d0480436b7469dd97eeb2913f0896c582267e59
                                          • Instruction Fuzzy Hash: 71314C70E006189FCB50DBA8CD90B9EB7BDAF99200F20859AE419E7245D771EDC1DF50
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000100,?,?,?,?,?,6E1725B1,?,00000000,?), ref: 6E1724E6
                                          • _malloc.LIBCMT ref: 6E17251B
                                          • _memset.LIBCMT ref: 6E17253B
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,00000001,?,00000000,00000001,00000000), ref: 6E172550
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6E17255E
                                          • __freea.LIBCMT ref: 6E172568
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$StringType__freea_malloc_memset
                                          • String ID:
                                          • API String ID: 525495869-0
                                          • Opcode ID: 3f6edb4e1e04e72f735c19407d2498a2fd0beaed38b4a2fd43db250df1b5be27
                                          • Instruction ID: f2d5d04e8a0da2ae82bb2eef4f68ccab7fd12280255f544393ad2d8f443a0078
                                          • Opcode Fuzzy Hash: 3f6edb4e1e04e72f735c19407d2498a2fd0beaed38b4a2fd43db250df1b5be27
                                          • Instruction Fuzzy Hash: 7B3149F161020AAFEF11CFA8DC909EF7BADEB09758F214425F91597250E730DDA1EA60
                                          APIs
                                            • Part of subcall function 6E1269C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E126A08
                                            • Part of subcall function 6E1269C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E126A15
                                            • Part of subcall function 6E1269C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E126A41
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Destroy$Bound$Element
                                          • String ID:
                                          • API String ID: 757764206-0
                                          • Opcode ID: 43048a4b5fe5f6f145d75443d9c0b1f94444dff260167a4f5ea3b668a25808dd
                                          • Instruction ID: 7c352c29b09d0bee348be4dc4029f122caed7ac1cbe0601cdb392efb784a0f4c
                                          • Opcode Fuzzy Hash: 43048a4b5fe5f6f145d75443d9c0b1f94444dff260167a4f5ea3b668a25808dd
                                          • Instruction Fuzzy Hash: 7F314F70E006189FCB50CBA8CC90B9EB7BAAF95300F20469AE419E7241C775EDC1DF50
                                          APIs
                                            • Part of subcall function 6E1269C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E126A08
                                            • Part of subcall function 6E1269C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E126A15
                                            • Part of subcall function 6E1269C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E126A41
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE63
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE73
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE86
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AE99
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEAC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12AEBF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Destroy$Bound$Element
                                          • String ID:
                                          • API String ID: 757764206-0
                                          • Opcode ID: 0975c4704db7d33784f8229dfa0a1c8ec76cccf13a3ce8d33c794a92c37e0daa
                                          • Instruction ID: b2b78833ab7f57703b08dfb33b598a5177bea6ec6afbf21594ffff36f7e9acb3
                                          • Opcode Fuzzy Hash: 0975c4704db7d33784f8229dfa0a1c8ec76cccf13a3ce8d33c794a92c37e0daa
                                          • Instruction Fuzzy Hash: 0A312A70E006189FCB10DBA8CC90B9EB7BAAF95200F20499AE419E7245DB75EDC1DF50
                                          APIs
                                            • Part of subcall function 6E1269C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E126A08
                                            • Part of subcall function 6E1269C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E126A15
                                            • Part of subcall function 6E1269C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E126A41
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Destroy$Bound$Element
                                          • String ID:
                                          • API String ID: 757764206-0
                                          • Opcode ID: 43048a4b5fe5f6f145d75443d9c0b1f94444dff260167a4f5ea3b668a25808dd
                                          • Instruction ID: f64ccae31748fd6c13e0f957de83ff381ca1a490b48965a5a57f207173005765
                                          • Opcode Fuzzy Hash: 43048a4b5fe5f6f145d75443d9c0b1f94444dff260167a4f5ea3b668a25808dd
                                          • Instruction Fuzzy Hash: 3F313C70E106189FCB50CBA9CC90B9DB7BAAF99300F60869AE419E7241CB75EDC0DF50
                                          APIs
                                            • Part of subcall function 6E1269C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E126A08
                                            • Part of subcall function 6E1269C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E126A15
                                            • Part of subcall function 6E1269C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E126A41
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223B3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223C3
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223D6
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223E9
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E1223FC
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12240F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Destroy$Bound$Element
                                          • String ID:
                                          • API String ID: 757764206-0
                                          • Opcode ID: 0975c4704db7d33784f8229dfa0a1c8ec76cccf13a3ce8d33c794a92c37e0daa
                                          • Instruction ID: 54ca4726de5cdcff9eef7f26a4d13253629992aac57804610b22e8121af18f22
                                          • Opcode Fuzzy Hash: 0975c4704db7d33784f8229dfa0a1c8ec76cccf13a3ce8d33c794a92c37e0daa
                                          • Instruction Fuzzy Hash: 87314970E106189FCB10CBA9CC80B9EB7BAAF99300F60859AE418E7241CB75DDC0DF50
                                          APIs
                                            • Part of subcall function 6E104760: __CxxThrowException@8.LIBCMT ref: 6E1047F9
                                          • _memmove.LIBCMT ref: 6E160907
                                          • _memmove.LIBCMT ref: 6E160936
                                          • _memmove.LIBCMT ref: 6E160959
                                          • __CxxThrowException@8.LIBCMT ref: 6E160A25
                                          Strings
                                          • PSSR_MEM: message recovery disabled, xrefs: 6E1609E3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove$Exception@8Throw
                                          • String ID: PSSR_MEM: message recovery disabled
                                          • API String ID: 2655171816-3051149714
                                          • Opcode ID: 4153c54af4dec681964635c956cee70bd0b83730975697c6d70d51c47f73936b
                                          • Instruction ID: 19b2528777c6bf59a590f63ef0d1cd9f70338d1c71adb169676975d416ea6ac6
                                          • Opcode Fuzzy Hash: 4153c54af4dec681964635c956cee70bd0b83730975697c6d70d51c47f73936b
                                          • Instruction Fuzzy Hash: B5C17A746083418FD754CF68C890B6BB7E5BFD9304F148A5CE5898B385E730E945CB92
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E1680EA
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                          • String ID: Max$Min$RandomNumberType$invalid bit length
                                          • API String ID: 3718517217-2498579642
                                          • Opcode ID: 9c0b3ee94c74e2cb7b2a2a0c6743d756a340986ad533ac82fa24127aa8953fbd
                                          • Instruction ID: e065037926aa6bd065a7cf9007686234c5d57512343654295f036b113e25d41a
                                          • Opcode Fuzzy Hash: 9c0b3ee94c74e2cb7b2a2a0c6743d756a340986ad533ac82fa24127aa8953fbd
                                          • Instruction Fuzzy Hash: 6BC190705087809FE324CBA8D850B8FB7E9AFDA318F544E1CE69983391DB749984D763
                                          APIs
                                          • __CreateFrameInfo.LIBCMT ref: 6E16BEB6
                                            • Part of subcall function 6E16AB70: __getptd.LIBCMT ref: 6E16AB7E
                                            • Part of subcall function 6E16AB70: __getptd.LIBCMT ref: 6E16AB8C
                                          • __getptd.LIBCMT ref: 6E16BEC0
                                            • Part of subcall function 6E16EAE6: __getptd_noexit.LIBCMT ref: 6E16EAE9
                                            • Part of subcall function 6E16EAE6: __amsg_exit.LIBCMT ref: 6E16EAF6
                                          • __getptd.LIBCMT ref: 6E16BECE
                                          • __getptd.LIBCMT ref: 6E16BEDC
                                          • __getptd.LIBCMT ref: 6E16BEE7
                                          • _CallCatchBlock2.LIBCMT ref: 6E16BF0D
                                            • Part of subcall function 6E16AC15: __CallSettingFrame@12.LIBCMT ref: 6E16AC61
                                            • Part of subcall function 6E16BFB4: __getptd.LIBCMT ref: 6E16BFC3
                                            • Part of subcall function 6E16BFB4: __getptd.LIBCMT ref: 6E16BFD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                          • String ID:
                                          • API String ID: 1602911419-0
                                          • Opcode ID: bbb0b99fc0f1bd0251636b9a9026c746798c8545c032047e18d5cefa1f53bc94
                                          • Instruction ID: 236b081934c48fffcad9835e461eee1c28bd05aa67dc1154652812561d68e6be
                                          • Opcode Fuzzy Hash: bbb0b99fc0f1bd0251636b9a9026c746798c8545c032047e18d5cefa1f53bc94
                                          • Instruction Fuzzy Hash: 3D11C9B1C002099FDB10DFE4D944AEEBBB4FF04318F108969F914A7250EB389AA5AF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120698527.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6700000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HERE$HERE$LOOK$LOOK$p<]q$p<]q$Guq
                                          • API String ID: 0-1107190866
                                          • Opcode ID: afabfe7020b93db150ab9ab1a6bb5bfe50e7e5665075ba2304e43dc8be0b29da
                                          • Instruction ID: 6454c48b6de02dff1b014dd96b67625fe2e7f1f9030e73cf9aa00af06e8bfab8
                                          • Opcode Fuzzy Hash: afabfe7020b93db150ab9ab1a6bb5bfe50e7e5665075ba2304e43dc8be0b29da
                                          • Instruction Fuzzy Hash: 57A18274E00229CFDBA8DF69C994BE9B7F1AB48310F5481E9D54DAB261DB309E81CF50
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E137267
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw
                                          • String ID: exceeds the maximum of $ is less than the minimum of $: IV length
                                          • API String ID: 2005118841-1273958906
                                          • Opcode ID: bb76f7bef817218ad191be80169976c21a94b7e43aebe9def534476fc9b78535
                                          • Instruction ID: 9584865a362897dcf57eaf995d01175f85fce23e1b5dae20a1039ff8cc54a724
                                          • Opcode Fuzzy Hash: bb76f7bef817218ad191be80169976c21a94b7e43aebe9def534476fc9b78535
                                          • Instruction Fuzzy Hash: B46173B11083809FD331DBA8C884FDFB7ECAF99344F104A1DE19D87241DB7599859BA2
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _strncmptype_info::operator!=
                                          • String ID: ThisPointer:$ValueNames
                                          • API String ID: 1333309372-2375088429
                                          • Opcode ID: 9e8502ade4ab57414f930e127c6aa091cb8570310788a2190259ca829355c889
                                          • Instruction ID: 7ed00c31d6b69dc9f0a404c5825b239643186e5a8327cb5487f0fbb0e7d2f3dc
                                          • Opcode Fuzzy Hash: 9e8502ade4ab57414f930e127c6aa091cb8570310788a2190259ca829355c889
                                          • Instruction Fuzzy Hash: 1F51E8B12083415FC314CFE4C890E6BB7FAAF95348F244A1DF5B68B355C722E899A761
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _strncmptype_info::operator!=
                                          • String ID: ThisPointer:$ValueNames
                                          • API String ID: 1333309372-2375088429
                                          • Opcode ID: 9299f947d26596e48285d97049b3334768c4a6a6ec6cc2ab33a459ebb3aacb15
                                          • Instruction ID: 52b2de1495335de0a6a2092338c35baa857fcd2879cefb4ca3e73208159da5eb
                                          • Opcode Fuzzy Hash: 9299f947d26596e48285d97049b3334768c4a6a6ec6cc2ab33a459ebb3aacb15
                                          • Instruction Fuzzy Hash: 0C5107712083505BC710CFE4C894A67FBEEAF96308F244A5CE5D68B381DB26E989E751
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _strncmptype_info::operator!=
                                          • String ID: ThisPointer:$ValueNames
                                          • API String ID: 1333309372-2375088429
                                          • Opcode ID: 5803589931e6634e41f9ca40b8b667b3a83c4697c10b6421148a5fae0a39f5df
                                          • Instruction ID: 04c7a04844fdcc3625274bd6f2c936d228a8f2713caed299424f555e8b89effb
                                          • Opcode Fuzzy Hash: 5803589931e6634e41f9ca40b8b667b3a83c4697c10b6421148a5fae0a39f5df
                                          • Instruction Fuzzy Hash: BC51F5B12083445BC310CFE9C890E67B7EAAF95218F144A1CF4F68B349D762E899E751
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E141C1A
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • __CxxThrowException@8.LIBCMT ref: 6E141CDE
                                          • __CxxThrowException@8.LIBCMT ref: 6E141D3E
                                          Strings
                                          • TF_SignerBase: the recoverable message part is too long for the given key and algorithm, xrefs: 6E141CF0
                                          • TF_SignerBase: this algorithm does not support messsage recovery or the key is too short, xrefs: 6E141C67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaise
                                          • String ID: TF_SignerBase: the recoverable message part is too long for the given key and algorithm$TF_SignerBase: this algorithm does not support messsage recovery or the key is too short
                                          • API String ID: 3476068407-3371871069
                                          • Opcode ID: 9b585f80e84f8cad52a155998922513f32ba1001bdefa3dde0c7f82325e36a2f
                                          • Instruction ID: 0c5627ffb9b7f386488f2e6708506098ec6711ea24ca8be22196f3ca58deb4a5
                                          • Opcode Fuzzy Hash: 9b585f80e84f8cad52a155998922513f32ba1001bdefa3dde0c7f82325e36a2f
                                          • Instruction Fuzzy Hash: D1515C752087409FD364DFA8C880F9FB7E9BFC8314F108A1DE58987390DB74A9459BA2
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                            • Part of subcall function 6E169125: std::exception::exception.LIBCMT ref: 6E16913A
                                            • Part of subcall function 6E169125: __CxxThrowException@8.LIBCMT ref: 6E16914F
                                            • Part of subcall function 6E169125: std::exception::exception.LIBCMT ref: 6E169160
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104067
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E1040C8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                          • String ID: invalid string position$string too long
                                          • API String ID: 1615890066-4289949731
                                          • Opcode ID: efa7371fcd0bc58f8650ffb5ead79bd915968b2a9d8f3c03b6c021ed0677b429
                                          • Instruction ID: 8fbf14fb83b155a98dfdbfcbe374ceeec4cd297f5bcb953388b4ae9c25c4b040
                                          • Opcode Fuzzy Hash: efa7371fcd0bc58f8650ffb5ead79bd915968b2a9d8f3c03b6c021ed0677b429
                                          • Instruction Fuzzy Hash: 1A31C8333046149BD320CEDCE8D0A9EF7A9DBB1765F20092FF151DB244DB629D8297A1
                                          APIs
                                          • ___BuildCatchObject.LIBCMT ref: 6E16C24E
                                            • Part of subcall function 6E16C1A9: ___BuildCatchObjectHelper.LIBCMT ref: 6E16C1DF
                                          • _UnwindNestedFrames.LIBCMT ref: 6E16C265
                                          • ___FrameUnwindToState.LIBCMT ref: 6E16C273
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                          • String ID: csm$csm
                                          • API String ID: 2163707966-3733052814
                                          • Opcode ID: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                          • Instruction ID: fc8876f059917dc9ab5a9f3ff09ea7a8d2bb23903fa0777373b7e3d7b1801691
                                          • Opcode Fuzzy Hash: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                          • Instruction Fuzzy Hash: 8501EF7140111ABBDF129FD1CC45EEA7F6AEF58358F108424BD2929120DB3699F2EBA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 98363f6b8327428a9bdbb61e9fc208b77b1c9cacb757156ca85a948106e101ab
                                          • Instruction ID: 46e8d465d07a5d46736b9864039c2f96d08eb47e486711da9dc551577432e4db
                                          • Opcode Fuzzy Hash: 98363f6b8327428a9bdbb61e9fc208b77b1c9cacb757156ca85a948106e101ab
                                          • Instruction Fuzzy Hash: E591AFB1208706CFD714CF98C890A2BB7E9FF98614F144A2DE499C3340E734E985DBA2
                                          APIs
                                          • SafeArrayGetElement.OLEAUT32(?,?,4F740BFF), ref: 6E123C49
                                          • VariantInit.OLEAUT32(?), ref: 6E123C81
                                          • VariantClear.OLEAUT32(?), ref: 6E123D26
                                          • VariantClear.OLEAUT32(?), ref: 6E123D30
                                          • VariantClear.OLEAUT32(?), ref: 6E123D89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ArrayElementInitSafe
                                          • String ID:
                                          • API String ID: 4110538090-0
                                          • Opcode ID: ca10b43aebd66d5b9a92220027cb09bf8a47b0776abdb27747c9ab3a3133ae15
                                          • Instruction ID: 9d60f77ed02098cb8b12b98c303b8374f22271bedc69b41689f2b00712da54c3
                                          • Opcode Fuzzy Hash: ca10b43aebd66d5b9a92220027cb09bf8a47b0776abdb27747c9ab3a3133ae15
                                          • Instruction Fuzzy Hash: 61616F72A0024A9FCB00DFD8CC849DEB7B9FF49310F648569E515AB350D731AD86DB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Timetime$Sleep
                                          • String ID:
                                          • API String ID: 4176159691-0
                                          • Opcode ID: 5de4775758c03e4f6d6bfab476e44a84b28f3fc70ac5b8479d2ec243de8a090a
                                          • Instruction ID: b0a081f721bef0ab5f518059ee3e946c3ade1afa7eee7d6200c6ea5cda53feff
                                          • Opcode Fuzzy Hash: 5de4775758c03e4f6d6bfab476e44a84b28f3fc70ac5b8479d2ec243de8a090a
                                          • Instruction Fuzzy Hash: 7051D2B1A042549FDB01CFE8C884BDE7BB8BB16340F24847ED518DB340D7719988AB91
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • _rand.LIBCMT ref: 6E116DEA
                                            • Part of subcall function 6E169E0C: __getptd.LIBCMT ref: 6E169E0C
                                          • std::exception::exception.LIBCMT ref: 6E116E17
                                          • __CxxThrowException@8.LIBCMT ref: 6E116E2C
                                          • std::exception::exception.LIBCMT ref: 6E116E3B
                                          • __CxxThrowException@8.LIBCMT ref: 6E116E50
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$__getptd_malloc_rand
                                          • String ID:
                                          • API String ID: 2791304714-0
                                          • Opcode ID: 92bbc997b70e4353d447ce3ad6bb30385abc0e4fa4a61a9c7b640db45d35414d
                                          • Instruction ID: 00de5c7ee5c2b3b298b9d46f28144cb2ccee75b2713efe927b8e88ca21f317f4
                                          • Opcode Fuzzy Hash: 92bbc997b70e4353d447ce3ad6bb30385abc0e4fa4a61a9c7b640db45d35414d
                                          • Instruction Fuzzy Hash: 823137B19047089FC760CFA8C880A9AFBF4FB08314F44896ED85A97B41E771E644CF60
                                          APIs
                                          • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 6E117761
                                          • LeaveCriticalSection.KERNEL32(00000000,?), ref: 6E117782
                                          • EnterCriticalSection.KERNEL32(00000018), ref: 6E117796
                                          • LeaveCriticalSection.KERNEL32(00000018), ref: 6E1177CE
                                          • QueueUserWorkItem.KERNEL32(6E131D50,00000000,00000010), ref: 6E11780C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                          • String ID:
                                          • API String ID: 584243675-0
                                          • Opcode ID: 0e7fae79b5aeae6749ab5872e55b03e3322de529842623c5952f3b2142a6889e
                                          • Instruction ID: bedd17b0ab6474ff5e45b478f770cca036ffc78de4799d08a163f678ff080fc9
                                          • Opcode Fuzzy Hash: 0e7fae79b5aeae6749ab5872e55b03e3322de529842623c5952f3b2142a6889e
                                          • Instruction Fuzzy Hash: 4C219171545709AFC740CFA4D858ADBBBF8FB56300F10886AE45687680DB30E989DBA1
                                          APIs
                                          • std::exception::exception.LIBCMT ref: 6E105ACB
                                            • Part of subcall function 6E169533: std::exception::_Copy_str.LIBCMT ref: 6E16954E
                                          • __CxxThrowException@8.LIBCMT ref: 6E105ABC
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • __CxxThrowException@8.LIBCMT ref: 6E105AE0
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E105B18
                                          • __CxxThrowException@8.LIBCMT ref: 6E105B2D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$std::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                          • String ID:
                                          • API String ID: 921928366-0
                                          • Opcode ID: 2432bc70290c58dc16fe431fe0de8be94d5d8e908334c370b051539ce6f88bd1
                                          • Instruction ID: e07b00b9ba7b13caf8e5d21b10709d7bd75bafd8582a698524901b9741685051
                                          • Opcode Fuzzy Hash: 2432bc70290c58dc16fe431fe0de8be94d5d8e908334c370b051539ce6f88bd1
                                          • Instruction Fuzzy Hash: C20140B28102086FDB04DFE4E850DDF7BBCAF14344F408559E909A7200EB30E694EBA5
                                          APIs
                                          • __getptd.LIBCMT ref: 6E16F047
                                            • Part of subcall function 6E16EAE6: __getptd_noexit.LIBCMT ref: 6E16EAE9
                                            • Part of subcall function 6E16EAE6: __amsg_exit.LIBCMT ref: 6E16EAF6
                                          • __amsg_exit.LIBCMT ref: 6E16F067
                                          • __lock.LIBCMT ref: 6E16F077
                                          • InterlockedDecrement.KERNEL32(?), ref: 6E16F094
                                          • InterlockedIncrement.KERNEL32(06351668), ref: 6E16F0BF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                          • String ID:
                                          • API String ID: 4271482742-0
                                          • Opcode ID: 78fcf45883d3114a3cb9a8f0746ce4ca4defd541fba639594b14018c3571d865
                                          • Instruction ID: e7db689694f496d0d4da47ead0bd29931ed5ebaeea6fdee018cfa7d1272e3143
                                          • Opcode Fuzzy Hash: 78fcf45883d3114a3cb9a8f0746ce4ca4defd541fba639594b14018c3571d865
                                          • Instruction Fuzzy Hash: FE01C475901A22ABDF11DFE984047AE777ABF09718F304545E830A7284CB3459E5FBD1
                                          APIs
                                          • __getptd.LIBCMT ref: 6E16F7C8
                                            • Part of subcall function 6E16EAE6: __getptd_noexit.LIBCMT ref: 6E16EAE9
                                            • Part of subcall function 6E16EAE6: __amsg_exit.LIBCMT ref: 6E16EAF6
                                          • __getptd.LIBCMT ref: 6E16F7DF
                                          • __amsg_exit.LIBCMT ref: 6E16F7ED
                                          • __lock.LIBCMT ref: 6E16F7FD
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 6E16F811
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                          • String ID:
                                          • API String ID: 938513278-0
                                          • Opcode ID: e4042c603e10c496027d659ee74ce92cbf8232e3858825349831a05c84f3c9ea
                                          • Instruction ID: 2cc9ae529581a52226e6df91b7cb884cc5da14cc8b046420ff378c425e03d542
                                          • Opcode Fuzzy Hash: e4042c603e10c496027d659ee74ce92cbf8232e3858825349831a05c84f3c9ea
                                          • Instruction Fuzzy Hash: 11F0F0729056108BDB20EFFC8805BCE33A47F0472CF308A09E4206B2C0CB201AE0FA92
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memcpy_s
                                          • String ID:
                                          • API String ID: 2001391462-3916222277
                                          • Opcode ID: 11d3e78ce3346f168802b5e6b6c69e07ff05280cb30532cc4eaef813f6c9f94e
                                          • Instruction ID: ad93559b1948063534e44397764e5389bdcc2cd615ac8b463f53c1d6550ea3f6
                                          • Opcode Fuzzy Hash: 11d3e78ce3346f168802b5e6b6c69e07ff05280cb30532cc4eaef813f6c9f94e
                                          • Instruction Fuzzy Hash: E3C168756083028FE744CF68C890A6AB7E2FF98314F144A2DE596CB354E771EA85CB42
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memcpy_s_memmove_memset
                                          • String ID: EncodingParameters
                                          • API String ID: 4034675494-55378216
                                          • Opcode ID: bf2b11fefa06ff25c52414b42599674588901d4a312bf25b202285396bce53a2
                                          • Instruction ID: c869a37365850daa2b81f16b84b930ca9946af8241ef3de7cb20624f62c5f287
                                          • Opcode Fuzzy Hash: bf2b11fefa06ff25c52414b42599674588901d4a312bf25b202285396bce53a2
                                          • Instruction Fuzzy Hash: E19179B46083819FD700CF68C880B5BBBE5BFDA748F14491DF99887391D671E985CBA2
                                          APIs
                                            • Part of subcall function 6E15D820: _memmove.LIBCMT ref: 6E15D930
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E1413D4
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                            • Part of subcall function 6E138D80: _malloc.LIBCMT ref: 6E138D8A
                                            • Part of subcall function 6E138D80: _malloc.LIBCMT ref: 6E138DAF
                                          Strings
                                          • for this key, xrefs: 6E141348
                                          • : ciphertext length of , xrefs: 6E1412E4
                                          • doesn't match the required length of , xrefs: 6E141316
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _malloc$ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                          • String ID: doesn't match the required length of $ for this key$: ciphertext length of
                                          • API String ID: 1025790555-2559040249
                                          • Opcode ID: 4920c2e4c4e0fadd1f8bdb1a3d4cc884a854fd3f2e5429a79a1ed2768e9d4a9d
                                          • Instruction ID: 8436ae04b364e137665019ce0f2344e449f7be972d0145af8676036c33da5bcc
                                          • Opcode Fuzzy Hash: 4920c2e4c4e0fadd1f8bdb1a3d4cc884a854fd3f2e5429a79a1ed2768e9d4a9d
                                          • Instruction Fuzzy Hash: 8DA16F716083809FD324CBA9D880BDBB7E9AFD9318F14491DE19D87390DB70A949DB93
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 6E16B50D
                                            • Part of subcall function 6E171AA0: __87except.LIBCMT ref: 6E171ADB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__87except__start
                                          • String ID: pow
                                          • API String ID: 2905807303-2276729525
                                          • Opcode ID: 4080eab810076563f614a6a7ef665c0d2a6cfc8527c8af785439be4f20c82444
                                          • Instruction ID: 79e9805e0452c2a670ed2eed294469b3c18fa95d057ea8e2e4c986f35719e9b9
                                          • Opcode Fuzzy Hash: 4080eab810076563f614a6a7ef665c0d2a6cfc8527c8af785439be4f20c82444
                                          • Instruction Fuzzy Hash: 7D518271B1C60286CF51AAD8C570B9A3BB8EB52B14F70CD59F4D54319CEB3488ECBA46
                                          APIs
                                          • __cftoe.LIBCMT ref: 6E1188ED
                                            • Part of subcall function 6E16A116: __mbstowcs_s_l.LIBCMT ref: 6E16A12C
                                          • __cftoe.LIBCMT ref: 6E118911
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: __cftoe$__mbstowcs_s_l
                                          • String ID: zX$P
                                          • API String ID: 1494777130-2079734279
                                          • Opcode ID: d29add3d3ef49b5cdc6b9b5d5bc72dbfae176d696aa113c8a120db21576262e8
                                          • Instruction ID: ff91c9f94645f324064cce0c7fa8eac4d649520441763591169eff9d47368d36
                                          • Opcode Fuzzy Hash: d29add3d3ef49b5cdc6b9b5d5bc72dbfae176d696aa113c8a120db21576262e8
                                          • Instruction Fuzzy Hash: F391FFB11087819FC376CF54C894BEBBBE8BB88714F508A1DE19D4B290EB716645CF92
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E138ABB
                                          • __CxxThrowException@8.LIBCMT ref: 6E138B82
                                          Strings
                                          • PK_DefaultDecryptionFilter: ciphertext too long, xrefs: 6E138A8E
                                          • : invalid ciphertext, xrefs: 6E138B48
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw
                                          • String ID: : invalid ciphertext$PK_DefaultDecryptionFilter: ciphertext too long
                                          • API String ID: 2005118841-483996327
                                          • Opcode ID: 59008ae936cafe963c6e61eceaded3e9ac1f6c21a1824f4dcd233d5c146a9fc7
                                          • Instruction ID: bda30afe73eca12c5275c4dab5bb2b87209cf3eea0f2510b45bfb2855441eba8
                                          • Opcode Fuzzy Hash: 59008ae936cafe963c6e61eceaded3e9ac1f6c21a1824f4dcd233d5c146a9fc7
                                          • Instruction Fuzzy Hash: 4A513AB51047419FD324CFA4C990EABB7F8BF98704F108E1DE59A87680DB31E949DB62
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E136BA6
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E104067
                                            • Part of subcall function 6E104010: _memmove.LIBCMT ref: 6E1040C8
                                          • __CxxThrowException@8.LIBCMT ref: 6E136C56
                                          Strings
                                          • NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes, xrefs: 6E136B33
                                          • RandomNumberGenerator: IncorporateEntropy not implemented, xrefs: 6E136BE3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                          • String ID: NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes$RandomNumberGenerator: IncorporateEntropy not implemented
                                          • API String ID: 1902190269-184618050
                                          • Opcode ID: 6d81f9314fbcf69f33841a278c534e3e4515888dba03aef4a323c3a5b448769a
                                          • Instruction ID: e99b3c9635ce03d01872f26a878e7f25d14d3072d15d6f0b0ec625ab3dbd73ab
                                          • Opcode Fuzzy Hash: 6d81f9314fbcf69f33841a278c534e3e4515888dba03aef4a323c3a5b448769a
                                          • Instruction Fuzzy Hash: AF5106B510C380AFC300CFA9C880A5BBBE8BF99764F504A1DF59597390DBB4D948DB52
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104EFC
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104F16
                                          • _memmove.LIBCMT ref: 6E104F6C
                                            • Part of subcall function 6E104D90: std::_Xinvalid_argument.LIBCPMT ref: 6E104DA9
                                            • Part of subcall function 6E104D90: std::_Xinvalid_argument.LIBCPMT ref: 6E104DCA
                                            • Part of subcall function 6E104D90: std::_Xinvalid_argument.LIBCPMT ref: 6E104DE5
                                            • Part of subcall function 6E104D90: _memmove.LIBCMT ref: 6E104E4D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                          • String ID: string too long
                                          • API String ID: 2168136238-2556327735
                                          • Opcode ID: 153b1c00d51b22c48dab5e433187435f22b53db62bf48f3fd9137a9b2eeb8fa3
                                          • Instruction ID: ba144f822332cf3e1c162e9d940b683791ec8ecdb77c8b233a75d7d41c3c822b
                                          • Opcode Fuzzy Hash: 153b1c00d51b22c48dab5e433187435f22b53db62bf48f3fd9137a9b2eeb8fa3
                                          • Instruction Fuzzy Hash: 873104323102104BE324DADCA4D09AEF7EAEFF1621B20492FE1558B680CB319CC693A1
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E10211F
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E104067
                                            • Part of subcall function 6E104010: _memmove.LIBCMT ref: 6E1040C8
                                          • __CxxThrowException@8.LIBCMT ref: 6E1021BF
                                          Strings
                                          • PK_MessageAccumulator: TruncatedFinal() should not be called, xrefs: 6E10215D
                                          • PK_MessageAccumulator: DigestSize() should not be called, xrefs: 6E1020BD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                          • String ID: PK_MessageAccumulator: DigestSize() should not be called$PK_MessageAccumulator: TruncatedFinal() should not be called
                                          • API String ID: 1902190269-1268710280
                                          • Opcode ID: fc828761724c1c579f2eb189f72b6e1301a26e1233c899435012f2b1f4cb2e74
                                          • Instruction ID: 7bbbf2f2a9619596301c5a2fd9ae1eee1aac7eb7253e593c1adc579bd60f8bb4
                                          • Opcode Fuzzy Hash: fc828761724c1c579f2eb189f72b6e1301a26e1233c899435012f2b1f4cb2e74
                                          • Instruction Fuzzy Hash: 2E411C70C0428CAFDB04DFE9D890AEEFBB8BB19354F504659E421A7690DB745688DF50
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E101DC9
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E104067
                                            • Part of subcall function 6E104010: _memmove.LIBCMT ref: 6E1040C8
                                          • __CxxThrowException@8.LIBCMT ref: 6E101E74
                                          Strings
                                          • CryptoMaterial: this object contains invalid values, xrefs: 6E101E16
                                          • BufferedTransformation: this object is not attachable, xrefs: 6E101D67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                          • String ID: BufferedTransformation: this object is not attachable$CryptoMaterial: this object contains invalid values
                                          • API String ID: 1902190269-3853263434
                                          • Opcode ID: 49f84eeab348aa8a603178a30b0d988205c474fbe7fd1f90fd3e6d54d871cb95
                                          • Instruction ID: 8bd1bf47200a56b576ba511b3e156d59e0c37594530914b83ffd8d8116a270e5
                                          • Opcode Fuzzy Hash: 49f84eeab348aa8a603178a30b0d988205c474fbe7fd1f90fd3e6d54d871cb95
                                          • Instruction Fuzzy Hash: 32411B70D04288AFDB04DFE9D890BDEFBB8FF19354F10866AE42567290DB745648DB50
                                          APIs
                                            • Part of subcall function 6E15D820: _memmove.LIBCMT ref: 6E15D930
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E13761A
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                          • String ID: byte digest to $ bytes$HashTransformation: can't truncate a
                                          • API String ID: 39012651-1139078987
                                          • Opcode ID: 0eb215d1c3a6bf3ea36d2e6839499227b93b020fef1d67a9ef893fb02937451a
                                          • Instruction ID: e697a70b37bef978c63a69a63d6568780afe4c1cb5c62bc26286613fe2df5e7d
                                          • Opcode Fuzzy Hash: 0eb215d1c3a6bf3ea36d2e6839499227b93b020fef1d67a9ef893fb02937451a
                                          • Instruction Fuzzy Hash: 9C416F7110C3C0ABD330CBA4C844FDBBBE8AB99314F104E1DE29997280EB7455889BA6
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E13BF2D
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                          • String ID: gfff$gfff$vector<T> too long
                                          • API String ID: 1823113695-3369487235
                                          • Opcode ID: 066d3e868106f24c57b351b1a2311c64c6863efe0f2e1b98ca9828a88a602a2c
                                          • Instruction ID: de0840872be2a86ce922bed4c20c2da5deba7ff20d96fd9b28fe5d856a14702c
                                          • Opcode Fuzzy Hash: 066d3e868106f24c57b351b1a2311c64c6863efe0f2e1b98ca9828a88a602a2c
                                          • Instruction Fuzzy Hash: 4C31B6B1A006099FC718CF9DD890EAAF7ADFB48310F14862DE9599B384E730B9448B91
                                          APIs
                                          • QueryPerformanceFrequency.KERNEL32(4F740BFF,4F740BFF), ref: 6E168E7F
                                          • GetLastError.KERNEL32(0000000A), ref: 6E168E8F
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E168F14
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          • Timer: QueryPerformanceFrequency failed with error , xrefs: 6E168EA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ErrorExceptionException@8FrequencyLastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                          • String ID: Timer: QueryPerformanceFrequency failed with error
                                          • API String ID: 2175244869-348333943
                                          • Opcode ID: 6d5080a1d30b27e50faec8e836862dd28de05d13f3434f82ac85ae8cc719010d
                                          • Instruction ID: 144b28440e48549ba6ac74b8934a80695e91fa77bcf2a79777b5ff54b176f926
                                          • Opcode Fuzzy Hash: 6d5080a1d30b27e50faec8e836862dd28de05d13f3434f82ac85ae8cc719010d
                                          • Instruction Fuzzy Hash: 40213BB150C3809FD310CF64C844B9FBBE8BF89614F508E1DF5A997281DB3595489BA2
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(4F740BFF,4F740BFF,?,00000000), ref: 6E168F7F
                                          • GetLastError.KERNEL32(0000000A,?,00000000), ref: 6E168F8F
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E169014
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          • Timer: QueryPerformanceCounter failed with error , xrefs: 6E168FA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CounterErrorExceptionException@8LastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                          • String ID: Timer: QueryPerformanceCounter failed with error
                                          • API String ID: 1823523280-4075696077
                                          • Opcode ID: 7cc2577f85e7c2eeb7660378b2c4dd1e20d87c67df9e968bdd04fdde47e6a7ea
                                          • Instruction ID: e884edeb1c6ab707785be269ceb6cdd12e5439aec0399be9a83fd7b855ed1a71
                                          • Opcode Fuzzy Hash: 7cc2577f85e7c2eeb7660378b2c4dd1e20d87c67df9e968bdd04fdde47e6a7ea
                                          • Instruction Fuzzy Hash: 6F213BB1508380AFD310CF64C884B9FBBE8BF89614F508E1DF5A997281DB3595489BA2
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E136518
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • __CxxThrowException@8.LIBCMT ref: 6E136558
                                          Strings
                                          • Cryptographic algorithms are disabled before the power-up self tests are performed., xrefs: 6E1364E7
                                          • Cryptographic algorithms are disabled after a power-up self test failed., xrefs: 6E136527
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaise
                                          • String ID: Cryptographic algorithms are disabled after a power-up self test failed.$Cryptographic algorithms are disabled before the power-up self tests are performed.
                                          • API String ID: 3476068407-3345525433
                                          • Opcode ID: 43072fb649847acaec87ee1c4b613af8b0c5b0971420b82013d0da8106aa1197
                                          • Instruction ID: ecf0a8373fe0d02af09e8fe87764d731ee49ce86e0565fd8941a664e792549ff
                                          • Opcode Fuzzy Hash: 43072fb649847acaec87ee1c4b613af8b0c5b0971420b82013d0da8106aa1197
                                          • Instruction Fuzzy Hash: 4D21D1B1528290DEC720CFE4C944BDBB3ECAB45748F504E1DE58586244EF759084EA62
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E13C14E
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                          • String ID: gfff$gfff$vector<T> too long
                                          • API String ID: 1823113695-3369487235
                                          • Opcode ID: 63f5d69aabe5b2191b5fbfc97cd1d726430ca3c0279cf37bb70ec4e9aac03b6a
                                          • Instruction ID: e0e2a89eb20e2e695a6105c52d00e323e7f2d420cde7e915da1aa8189ad226c6
                                          • Opcode Fuzzy Hash: 63f5d69aabe5b2191b5fbfc97cd1d726430ca3c0279cf37bb70ec4e9aac03b6a
                                          • Instruction Fuzzy Hash: 7801AD73F140355F831099BFED4444EEA8BABD439572ACA3AE608DF349E571DC8262D2
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove$Exception@8Throw
                                          • String ID:
                                          • API String ID: 2655171816-0
                                          • Opcode ID: 7bc808c26cbd6545135fe312abeba887e6e7a35b6a5ae3c4e431d98ab0125f58
                                          • Instruction ID: 2c69c2057dd7587ea5133c671fa6671e76bb6545d1720a52fb0a51b7a50f576b
                                          • Opcode Fuzzy Hash: 7bc808c26cbd6545135fe312abeba887e6e7a35b6a5ae3c4e431d98ab0125f58
                                          • Instruction Fuzzy Hash: C55180753047068FD704DFA9C990A2FB7E9AFD8614F10492DE995C3340EB34E985DB92
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E11D5E4
                                          • __CxxThrowException@8.LIBCMT ref: 6E11D5F9
                                          • std::exception::exception.LIBCMT ref: 6E11D608
                                          • __CxxThrowException@8.LIBCMT ref: 6E11D61D
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$_malloc
                                          • String ID:
                                          • API String ID: 2621100827-0
                                          • Opcode ID: dec577eae12388752215a1ea9ae81c42493072f11ce3e7e0a1b666dabac360d1
                                          • Instruction ID: cbdb415d7636d6e9b9d95e096536539c84590ea86604aaab9e0134bf148429d9
                                          • Opcode Fuzzy Hash: dec577eae12388752215a1ea9ae81c42493072f11ce3e7e0a1b666dabac360d1
                                          • Instruction Fuzzy Hash: 80515CB1A04649AFC744CFA8C980A9AFBF4FF08304F50866AD419D7740D771E994DFA1
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E126035
                                          • __CxxThrowException@8.LIBCMT ref: 6E12604A
                                          • std::exception::exception.LIBCMT ref: 6E126059
                                          • __CxxThrowException@8.LIBCMT ref: 6E12606E
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$_malloc
                                          • String ID:
                                          • API String ID: 2621100827-0
                                          • Opcode ID: 9c7d3ebedf32ff2e58277af0602028e99ad27680f0832e07f6465b3ad9e7a608
                                          • Instruction ID: f3c220231ce840709754843fe4315dae52b6092c6d16f69cd59f483416aa23e2
                                          • Opcode Fuzzy Hash: 9c7d3ebedf32ff2e58277af0602028e99ad27680f0832e07f6465b3ad9e7a608
                                          • Instruction Fuzzy Hash: 5F514EB1A0064AEFC744CFA8C980A9AFBF4FF08304F50866AD519D7B41D771E994DBA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$Init
                                          • String ID:
                                          • API String ID: 3740757921-0
                                          • Opcode ID: 922ccb9421ca275042794057d276e360628e43956dedda185cff2a184ab4bd64
                                          • Instruction ID: a0894635bb89e699ad7b646414739d36bd6838c5298c6ff7a39f6cb234b6b7ba
                                          • Opcode Fuzzy Hash: 922ccb9421ca275042794057d276e360628e43956dedda185cff2a184ab4bd64
                                          • Instruction Fuzzy Hash: 2141AB322092429FD700DF69C840B9BB7E8FF99721F148A6DF9449B350D731E945CB92
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E125E87
                                          • __CxxThrowException@8.LIBCMT ref: 6E125E9C
                                          • std::exception::exception.LIBCMT ref: 6E125EAB
                                          • __CxxThrowException@8.LIBCMT ref: 6E125EC0
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$_malloc
                                          • String ID:
                                          • API String ID: 2621100827-0
                                          • Opcode ID: 22206a7353b42e7cf6d8315b0a49728bcb00a9521b719d6435ef63d33b713992
                                          • Instruction ID: e0de8b6b3ea5e0d3f20c999cf51085c3307e2a5bb6e35c1c6a7eacc2ae9117d0
                                          • Opcode Fuzzy Hash: 22206a7353b42e7cf6d8315b0a49728bcb00a9521b719d6435ef63d33b713992
                                          • Instruction Fuzzy Hash: D0414CB19007489FC724CFA8D880A9AFBF8FF18304F40896ED95A97741E771E584DBA5
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E11D437
                                          • __CxxThrowException@8.LIBCMT ref: 6E11D44C
                                          • std::exception::exception.LIBCMT ref: 6E11D45B
                                          • __CxxThrowException@8.LIBCMT ref: 6E11D470
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw$_malloc
                                          • String ID:
                                          • API String ID: 2621100827-0
                                          • Opcode ID: d5a0732f15bd8e1c443d677e439f075351eb8e0d13e355c10433ee40e7dfd5d3
                                          • Instruction ID: c75d8a00d9c57af759dee3b61d8b26314b1c401d756e019bb9129a4349fb425f
                                          • Opcode Fuzzy Hash: d5a0732f15bd8e1c443d677e439f075351eb8e0d13e355c10433ee40e7dfd5d3
                                          • Instruction Fuzzy Hash: 02414BB19047489FC720CFA8D880A9ABBF8FF08304F40896ED95A97B41E771E544DFA1
                                          APIs
                                            • Part of subcall function 6E136480: __CxxThrowException@8.LIBCMT ref: 6E136518
                                            • Part of subcall function 6E136480: __CxxThrowException@8.LIBCMT ref: 6E136558
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E162C9A
                                          • __CxxThrowException@8.LIBCMT ref: 6E162CB1
                                          • std::exception::exception.LIBCMT ref: 6E162CC3
                                          • __CxxThrowException@8.LIBCMT ref: 6E162CDA
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C04
                                            • Part of subcall function 6E169BB5: std::exception::exception.LIBCMT ref: 6E169C1E
                                            • Part of subcall function 6E169BB5: __CxxThrowException@8.LIBCMT ref: 6E169C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$std::exception::exception$_malloc
                                          • String ID:
                                          • API String ID: 3942750879-0
                                          • Opcode ID: 029809fbafebde34c5bf6754f253bc46ac53134feba7345b114459ce5f5fb98c
                                          • Instruction ID: dd15afe75c76f22f004fd4ddbb2f1a6a8f6652e9e07fe320b1a0850a08c05a2d
                                          • Opcode Fuzzy Hash: 029809fbafebde34c5bf6754f253bc46ac53134feba7345b114459ce5f5fb98c
                                          • Instruction Fuzzy Hash: B14138B15187419FC314CF98C880A4AFBF8BF99714F508E2EE19A87650D7B0A584CB92
                                          APIs
                                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E12C478
                                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E12C488
                                          • SafeArrayGetElement.OLEAUT32(?,00000001,?), ref: 6E12C4B4
                                          • SafeArrayDestroy.OLEAUT32(?), ref: 6E12C512
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Bound$DestroyElement
                                          • String ID:
                                          • API String ID: 3987547017-0
                                          • Opcode ID: c37c6096a3f5c0b2565bb5c8480a6696a44f3c9842bf983929b5d9e734aa7bbc
                                          • Instruction ID: 1359ef99d13dccb284454994afba9f6771af7d796366226958a3a8651bbc44f3
                                          • Opcode Fuzzy Hash: c37c6096a3f5c0b2565bb5c8480a6696a44f3c9842bf983929b5d9e734aa7bbc
                                          • Instruction Fuzzy Hash: EE410075A0014AAFDB00DFD8C884DAEB7B8EB59350F10C569F919EB240D730EA85DB60
                                          APIs
                                          • VariantInit.OLEAUT32(6E1802A0), ref: 6E12B5D5
                                          • VariantInit.OLEAUT32(?), ref: 6E12B5E2
                                          • VariantClear.OLEAUT32(?), ref: 6E12B685
                                          • VariantClear.OLEAUT32(6E1802A0), ref: 6E12B68B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID:
                                          • API String ID: 2610073882-0
                                          • Opcode ID: 5119f644796f7c4102269f26bea578684a00c6f6e563a02f42f0b4114afafcf4
                                          • Instruction ID: 2d3ce34c0b56534b57cd80689952140a6536516adac1d5370477e15a95381076
                                          • Opcode Fuzzy Hash: 5119f644796f7c4102269f26bea578684a00c6f6e563a02f42f0b4114afafcf4
                                          • Instruction Fuzzy Hash: 72418072A006099FDB04DFA8C980F9AF7F9FF99310F2081A9E9149B354D735E941DB90
                                          APIs
                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6E1788FD
                                          • __isleadbyte_l.LIBCMT ref: 6E178930
                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 6E178961
                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 6E1789CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                          • String ID:
                                          • API String ID: 3058430110-0
                                          • Opcode ID: 8e830fcd92cb53bc29904f225b62e653f3c374a681b224aa2f3d0f1ba5259932
                                          • Instruction ID: c5309da100e7932e76afd03324bf193e7cf18131ee4c95bc6867f59015e72020
                                          • Opcode Fuzzy Hash: 8e830fcd92cb53bc29904f225b62e653f3c374a681b224aa2f3d0f1ba5259932
                                          • Instruction Fuzzy Hash: E031C031A14266EFDF20DFE8C8909AE3BB8BF42710F2185A9E1659B190D731DDC0EB51
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E105ACB
                                          • __CxxThrowException@8.LIBCMT ref: 6E105AE0
                                          • std::exception::exception.LIBCMT ref: 6E105B18
                                          • __CxxThrowException@8.LIBCMT ref: 6E105B2D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throwstd::exception::exception$_malloc
                                          • String ID:
                                          • API String ID: 3153320871-0
                                          • Opcode ID: 45f487f94a54a5e3b6ef7dfad5504f9f2c960eb9bafcd55a0110bbfca373a1e8
                                          • Instruction ID: c8dce288eca40141196d4efaeea6de8bb94cbd12925809fd7ee98cdfb9c1b569
                                          • Opcode Fuzzy Hash: 45f487f94a54a5e3b6ef7dfad5504f9f2c960eb9bafcd55a0110bbfca373a1e8
                                          • Instruction Fuzzy Hash: CD3171B5914608ABCB14DFD8D8409DBBBF8FF48750F10C66AE81997740EB30AA54DBE1
                                          APIs
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • InitializeCriticalSection.KERNEL32(00000000,00000000,6E115D89,00000000,00000004,00000000,?,00000000,00000000), ref: 6E1184EA
                                          • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000), ref: 6E1184F0
                                          • std::exception::exception.LIBCMT ref: 6E11853C
                                          • __CxxThrowException@8.LIBCMT ref: 6E118551
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalInitializeSection$Exception@8Throw_mallocstd::exception::exception
                                          • String ID:
                                          • API String ID: 3005353045-0
                                          • Opcode ID: 1c51c78c2940ff3a7b5015faa6af5435920b1c35a590a5892495ab2fe29b4e5e
                                          • Instruction ID: a89e305de259497b7ea199bbc4c362bd7894e6be0f26b85064cbb6400a8025eb
                                          • Opcode Fuzzy Hash: 1c51c78c2940ff3a7b5015faa6af5435920b1c35a590a5892495ab2fe29b4e5e
                                          • Instruction Fuzzy Hash: 22316DB16057049FC744CFA8C480A9AFBF8FF08310F508A6ED91687B40D770EA44DB90
                                          APIs
                                          • std::exception::exception.LIBCMT ref: 6E12DCC5
                                            • Part of subcall function 6E169533: std::exception::_Copy_str.LIBCMT ref: 6E16954E
                                          • __CxxThrowException@8.LIBCMT ref: 6E12DCDA
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                          • std::exception::exception.LIBCMT ref: 6E12DD09
                                          • __CxxThrowException@8.LIBCMT ref: 6E12DD1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throwstd::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                          • String ID:
                                          • API String ID: 399550787-0
                                          • Opcode ID: 6dfc46b27f51c826fb8ba2f62505b4b50256af8af98f2e7836136148760454c5
                                          • Instruction ID: adab6cad27ec1562a03d051d90bff06e58f4cc40b46d43abccbae4be77b4fbf1
                                          • Opcode Fuzzy Hash: 6dfc46b27f51c826fb8ba2f62505b4b50256af8af98f2e7836136148760454c5
                                          • Instruction Fuzzy Hash: 5B3170B59002089FD704CFD9D850A9EBBF8FF54310F40856EE91997350E770EA94EBA0
                                          APIs
                                          • _malloc.LIBCMT ref: 6E172653
                                            • Part of subcall function 6E169D66: __FF_MSGBANNER.LIBCMT ref: 6E169D7F
                                            • Part of subcall function 6E169D66: __NMSG_WRITE.LIBCMT ref: 6E169D86
                                            • Part of subcall function 6E169D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E169DAB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: AllocateHeap_malloc
                                          • String ID:
                                          • API String ID: 501242067-0
                                          • Opcode ID: 568ea18b20a938d14c52cdcebadcccaeebacacdc1bc15bdd04e0518fe626e679
                                          • Instruction ID: 74a14b6b00730a73352e5862f5ec6de2c8dbb3161a16401bfe3915762f7acb4d
                                          • Opcode Fuzzy Hash: 568ea18b20a938d14c52cdcebadcccaeebacacdc1bc15bdd04e0518fe626e679
                                          • Instruction Fuzzy Hash: E311B2734486156BCF326BF5A80469E37ACAB52B64B314826FC249F240DF3089D2FB94
                                          APIs
                                            • Part of subcall function 6E134410: _malloc.LIBCMT ref: 6E13446E
                                          • SafeArrayCreateVector.OLEAUT32(00000011,00000000,?), ref: 6E117287
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6E11729B
                                          • _memmove.LIBCMT ref: 6E1172AF
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E1172B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Data$AccessCreateUnaccessVector_malloc_memmove
                                          • String ID:
                                          • API String ID: 583974297-0
                                          • Opcode ID: cf9855fd682c6164cb80b8409e50b39b472dfa3fa82aa08600fd2633fc3e4a2d
                                          • Instruction ID: 55c07e9ff3c8e8b493ddcc53f3acf96b47e35b0aff95a73d667a48c05d450a7e
                                          • Opcode Fuzzy Hash: cf9855fd682c6164cb80b8409e50b39b472dfa3fa82aa08600fd2633fc3e4a2d
                                          • Instruction Fuzzy Hash: 571160B6A04118BBCB14CFE5DC80DDFBB7DDF9A654B00C26AF90497240E6709A469BE1
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 6E125AB9
                                          • VariantCopy.OLEAUT32(?,6E199C90), ref: 6E125AC1
                                          • VariantClear.OLEAUT32(?), ref: 6E125AE2
                                          • __CxxThrowException@8.LIBCMT ref: 6E125AEF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCopyException@8InitThrow
                                          • String ID:
                                          • API String ID: 3826472263-0
                                          • Opcode ID: 7d0a68ef2badae7c1126c88830d80b382b6fd286385eaa32ceee27e2ca2dbdd8
                                          • Instruction ID: 6a5c1388c59572401323d44f6258dbbdcd90b98c17c34eacbd9e3833b5ddfb00
                                          • Opcode Fuzzy Hash: 7d0a68ef2badae7c1126c88830d80b382b6fd286385eaa32ceee27e2ca2dbdd8
                                          • Instruction Fuzzy Hash: 7611B172904668AFCB00CF988CC49DFBB78FB46624F11813AE824A7300D7756E809BE1
                                          APIs
                                          • _malloc.LIBCMT ref: 6E138D8A
                                            • Part of subcall function 6E169D66: __FF_MSGBANNER.LIBCMT ref: 6E169D7F
                                            • Part of subcall function 6E169D66: __NMSG_WRITE.LIBCMT ref: 6E169D86
                                            • Part of subcall function 6E169D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6E169BD4,6E101290,4F740BFF), ref: 6E169DAB
                                            • Part of subcall function 6E1691F6: std::_Lockit::_Lockit.LIBCPMT ref: 6E169202
                                          • _malloc.LIBCMT ref: 6E138DAF
                                          • std::exception::exception.LIBCMT ref: 6E138DD4
                                          • __CxxThrowException@8.LIBCMT ref: 6E138DEB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _malloc$AllocateException@8HeapLockitLockit::_Throwstd::_std::exception::exception
                                          • String ID:
                                          • API String ID: 3043633502-0
                                          • Opcode ID: 997efb8bf209c8ad95eca836863de06102ef8ca1d8e819a501ed5ca7a2bc6dce
                                          • Instruction ID: 4687a79e7dc3f2d042818d079f46026211d82f1e993342a4ed1a4f98691c33d4
                                          • Opcode Fuzzy Hash: 997efb8bf209c8ad95eca836863de06102ef8ca1d8e819a501ed5ca7a2bc6dce
                                          • Instruction Fuzzy Hash: F6F0F67240432517D201DBD59C61BDF37FC9FA1721F500C2CE95491140FB20D199A5F3
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                          • String ID:
                                          • API String ID: 3016257755-0
                                          • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                          • Instruction ID: a1bc7999c6468adcb7c6ed7e8b8329455d7a8b307b3dac4ae13bb4df77b8781d
                                          • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                          • Instruction Fuzzy Hash: C5112B3644024ABBCF229EC4DC118DE3F26BB19A54F598915FA6859060E337C9B1BB81
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _memmove_memset
                                          • String ID: EncodingParameters
                                          • API String ID: 3555123492-55378216
                                          • Opcode ID: 188670a0c6958cf67d632b145818ee1b1357cc070db9a15aa518be64a6094593
                                          • Instruction ID: 2327293bcb3536191a21d20e2e822eec3e63fb3f7a995ac128ea8ce5f0b66d17
                                          • Opcode Fuzzy Hash: 188670a0c6958cf67d632b145818ee1b1357cc070db9a15aa518be64a6094593
                                          • Instruction Fuzzy Hash: F161D0B42083419FD304CF69C880A2BFBE9AFD9754F148A1DF59987391D770E945CBA2
                                          APIs
                                            • Part of subcall function 6E104760: __CxxThrowException@8.LIBCMT ref: 6E1047F9
                                            • Part of subcall function 6E138D80: _malloc.LIBCMT ref: 6E138D8A
                                            • Part of subcall function 6E138D80: _malloc.LIBCMT ref: 6E138DAF
                                          • _memcpy_s.LIBCMT ref: 6E10F282
                                          • _memset.LIBCMT ref: 6E10F293
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: _malloc$Exception@8Throw_memcpy_s_memset
                                          • String ID: @
                                          • API String ID: 3081897325-2766056989
                                          • Opcode ID: 51f1b27b70db70cd2d5b35e5d6f9081114479607ab56d037fe0d60208fda6971
                                          • Instruction ID: 2634cc1df66635ef54b5d898ff2f28d10a1797c6ce707e70d165928c12335380
                                          • Opcode Fuzzy Hash: 51f1b27b70db70cd2d5b35e5d6f9081114479607ab56d037fe0d60208fda6971
                                          • Instruction Fuzzy Hash: 9F51CF70A00248DFDB10CFE4C880BDEBBB4BF15304F108598E55967381DB716A89EF91
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104175
                                          • _memmove.LIBCMT ref: 6E1041C6
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                          • String ID: string too long
                                          • API String ID: 2168136238-2556327735
                                          • Opcode ID: 38e66f2a4b3a105d155b4e5414ff2eaec69b78026e125d50a0f9424fc241cbdc
                                          • Instruction ID: 27fe89e5d2fa5dc98668a7c9452d86f0dc0c2c8dc99a97631bff58618cd9eba9
                                          • Opcode Fuzzy Hash: 38e66f2a4b3a105d155b4e5414ff2eaec69b78026e125d50a0f9424fc241cbdc
                                          • Instruction Fuzzy Hash: B531C4323146155BE320CEDCACD0A5AF7EDEBB5724B20091BE591C7A80CB71ACC297A1
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E13C39B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw
                                          • String ID: gfff$gfff
                                          • API String ID: 2005118841-3084402119
                                          • Opcode ID: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                          • Instruction ID: 7b458196180a210a4b68a0a5f796e282af4ab6b2b872e6cc70d30edf77294d44
                                          • Opcode Fuzzy Hash: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                          • Instruction Fuzzy Hash: A231927190061DAFD714CF98D880EFEB779EB84314F14851CE8159B284E730BA59DBA1
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E10194F
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • std::exception::exception.LIBCMT ref: 6E10198E
                                            • Part of subcall function 6E1695C1: std::exception::operator=.LIBCMT ref: 6E1695DA
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E104067
                                            • Part of subcall function 6E104010: _memmove.LIBCMT ref: 6E1040C8
                                          Strings
                                          • Clone() is not implemented yet., xrefs: 6E1018ED
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                          • String ID: Clone() is not implemented yet.
                                          • API String ID: 2192554526-226299721
                                          • Opcode ID: c621dcbd2628835e89f8c3c028bdf827b7656ee014326bef22176d12a4e52e20
                                          • Instruction ID: 74375bb32fdb437f393d15a67562de41d3c2a3cbe5359b23491638a87492c9ff
                                          • Opcode Fuzzy Hash: c621dcbd2628835e89f8c3c028bdf827b7656ee014326bef22176d12a4e52e20
                                          • Instruction Fuzzy Hash: D9315EB1904248AFDB14CFD9D880AEEFBB8FB19324F104A6EE421A7780DB745645DF90
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E135657
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          • InputBuffer, xrefs: 6E1355BF
                                          • StringStore: missing InputBuffer argument, xrefs: 6E1355E0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                          • String ID: InputBuffer$StringStore: missing InputBuffer argument
                                          • API String ID: 3718517217-2380213735
                                          • Opcode ID: e1daa36b790239053c5816db2b1769fe34001b8a1c1e498bd7e97d24dd9410ab
                                          • Instruction ID: 0d574c82bfead16d7007ca910bd653176d063f7a5a99e97d18c2cdc9f7ae2ae2
                                          • Opcode Fuzzy Hash: e1daa36b790239053c5816db2b1769fe34001b8a1c1e498bd7e97d24dd9410ab
                                          • Instruction Fuzzy Hash: B94168B15087809FC320CFA9D490B9BFBE4BB99714F508A1EF5E987380DB749948DB52
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E101F36
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • std::exception::exception.LIBCMT ref: 6E101F6E
                                            • Part of subcall function 6E1695C1: std::exception::operator=.LIBCMT ref: 6E1695DA
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E104067
                                            • Part of subcall function 6E104010: _memmove.LIBCMT ref: 6E1040C8
                                          Strings
                                          • CryptoMaterial: this object does not support precomputation, xrefs: 6E101ED4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                          • String ID: CryptoMaterial: this object does not support precomputation
                                          • API String ID: 2192554526-3625584042
                                          • Opcode ID: 7e61d366c6e65c3c21fa55907203543818d83da273c8cdad112d0521d3192f30
                                          • Instruction ID: b2d26d9756324a1c74beeb0664f731b0071e2f630e9c5bd6fd0f3ff9d72e72c1
                                          • Opcode Fuzzy Hash: 7e61d366c6e65c3c21fa55907203543818d83da273c8cdad112d0521d3192f30
                                          • Instruction Fuzzy Hash: D8315EB1904248AFDB14CFD8D880AEEFBB8FB09724F10866EE521A7780DB745945DF90
                                          APIs
                                          • __CxxThrowException@8.LIBCMT ref: 6E113327
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E11336B
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Exception@8Throwstd::exception::exception$ExceptionRaiseXinvalid_argumentstd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 1735018483-3788999226
                                          • Opcode ID: 965994ac5b6bdb498dbc114244acbd8195d8c5dbfaa808b64513d2897fc9462f
                                          • Instruction ID: 43b9cfb03b4e4438d09d305951d2372670aab83c3f558b79c37cecd5873bc0f0
                                          • Opcode Fuzzy Hash: 965994ac5b6bdb498dbc114244acbd8195d8c5dbfaa808b64513d2897fc9462f
                                          • Instruction Fuzzy Hash: 7A310575A086059FCB14CFD8D894AAEB7B4FB04714F118639E92A9F380DB31BD80DB91
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E12584D
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • VariantClear.OLEAUT32(00000000), ref: 6E125899
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$ClearException@8ThrowVariantXinvalid_argumentstd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 2677079660-3788999226
                                          • Opcode ID: fb517a822fd74729b6c4357a4e3733e32789f89f38420fcbc88c37376d66554f
                                          • Instruction ID: b5428b79156950b0e05d25b7ff73efb78b613dfcae65e7b28a09f37f4b1e449e
                                          • Opcode Fuzzy Hash: fb517a822fd74729b6c4357a4e3733e32789f89f38420fcbc88c37376d66554f
                                          • Instruction Fuzzy Hash: 7E2190B2A006099FD710CFA9D8C0A6EB7F9FF44324F204A3EE455D7744EB70A9809B91
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E11576B
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E115782
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                          • String ID: string too long
                                          • API String ID: 963545896-2556327735
                                          • Opcode ID: 1bd470b5eb453657adcecc1571873f7506a7129d16c2477c1ec6b7018ef0a8ea
                                          • Instruction ID: f5d96078d01c7468312ad33612fe9040b3b04f0ff746996804cea47e27dab7c1
                                          • Opcode Fuzzy Hash: 1bd470b5eb453657adcecc1571873f7506a7129d16c2477c1ec6b7018ef0a8ea
                                          • Instruction Fuzzy Hash: 5D11BB333087149FD3219ADCA890AAAF3EDFBA5620B60062FE552C7640C761988497A1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E1046C4
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E10470B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                          • String ID: string too long
                                          • API String ID: 1785806476-2556327735
                                          • Opcode ID: 16c0864041441dfbb5e05779d71194924aea5d5cbd692dece1910172242dc6e5
                                          • Instruction ID: 7371648f99b5ac2e6378adc17aad80f36dd98dfbb5334feb57a3f3f1fd57c4d5
                                          • Opcode Fuzzy Hash: 16c0864041441dfbb5e05779d71194924aea5d5cbd692dece1910172242dc6e5
                                          • Instruction Fuzzy Hash: D611E9722143155FF721DEF8A8D0A6EB7A8AF71318F200E2FE59783581DF61A4C99351
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E134E00
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          • ArraySink: missing OutputBuffer argument, xrefs: 6E134D91
                                          • OutputBuffer, xrefs: 6E134D77
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                          • String ID: ArraySink: missing OutputBuffer argument$OutputBuffer
                                          • API String ID: 3718517217-3781944848
                                          • Opcode ID: 7cd80ce413d5eb5286342481abaea5edf50a3bf8187ad8b13589c31fa4b0ddc2
                                          • Instruction ID: 2388556c6cf068401e9d2055ccdfd1dfb3d6eeab00a50b13d1af1e9fbcd7508e
                                          • Opcode Fuzzy Hash: 7cd80ce413d5eb5286342481abaea5edf50a3bf8187ad8b13589c31fa4b0ddc2
                                          • Instruction Fuzzy Hash: A23125B550C7809FC314CFA8C480A9BBBE4BB99710F408E1EF5A697350DB74D548DB92
                                          APIs
                                            • Part of subcall function 6E104010: std::_Xinvalid_argument.LIBCPMT ref: 6E10402A
                                          • __CxxThrowException@8.LIBCMT ref: 6E110201
                                            • Part of subcall function 6E16AC75: RaiseException.KERNEL32(?,?,6E169C34,4F740BFF,?,?,?,?,6E169C34,4F740BFF,6E199C90,6E1AB974,4F740BFF), ref: 6E16ACB7
                                          Strings
                                          • OutputStringPointer, xrefs: 6E11018C
                                          • StringSink: OutputStringPointer not specified, xrefs: 6E11019B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                          • String ID: OutputStringPointer$StringSink: OutputStringPointer not specified
                                          • API String ID: 3718517217-1331214609
                                          • Opcode ID: f3fcd679bc819232a4fd6ecefe652026cf99b05ae14d1ed5025d082f866ab5b8
                                          • Instruction ID: fb733e6a74362824b7b92904cafc118256d266937c3df22ddd08a17d2d92b610
                                          • Opcode Fuzzy Hash: f3fcd679bc819232a4fd6ecefe652026cf99b05ae14d1ed5025d082f866ab5b8
                                          • Instruction Fuzzy Hash: 9C214F75D04288AFCB04DFD8D890BEEFBB8FB19354F10865AE425AB381DB355684EB50
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E104636
                                            • Part of subcall function 6E169125: std::exception::exception.LIBCMT ref: 6E16913A
                                            • Part of subcall function 6E169125: __CxxThrowException@8.LIBCMT ref: 6E16914F
                                            • Part of subcall function 6E169125: std::exception::exception.LIBCMT ref: 6E169160
                                          • _memmove.LIBCMT ref: 6E10466F
                                          Strings
                                          • invalid string position, xrefs: 6E104631
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                          • String ID: invalid string position
                                          • API String ID: 1785806476-1799206989
                                          • Opcode ID: 3ae5542bdfee3979697d32bb0d1f03ea7f3e68a2cbdb245e0fb6311fbef1a8cc
                                          • Instruction ID: 5a7661ceabdaff9032c7452f47e356e2d5ceb06e046b329bd85a332a37aa3173
                                          • Opcode Fuzzy Hash: 3ae5542bdfee3979697d32bb0d1f03ea7f3e68a2cbdb245e0fb6311fbef1a8cc
                                          • Instruction Fuzzy Hash: 0C01C8313002418BD320CEDCDCE095AB3BA9BE5610B244929D1A5CB701EEB1EC8293A1
                                          APIs
                                          • type_info::operator!=.LIBCMT ref: 6E13ACF8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: type_info::operator!=
                                          • String ID: Modulus$PublicExponent
                                          • API String ID: 2241493438-3324115277
                                          • Opcode ID: 6bd880535e60e675814e8c2e974d3747e8caa13eebbc224f71e6e18f37b4d261
                                          • Instruction ID: 1e0b5c47920c5feee5778482bade75e1a25aa8080aedd7c2a3a3fb3fc8c98a3f
                                          • Opcode Fuzzy Hash: 6bd880535e60e675814e8c2e974d3747e8caa13eebbc224f71e6e18f37b4d261
                                          • Instruction Fuzzy Hash: 9C11E3709083149FCA00DFE8C85458BFBE8BFD5354F204A1EF885AB260DB3099C8DB92
                                          APIs
                                          • type_info::operator!=.LIBCMT ref: 6E15B848
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: type_info::operator!=
                                          • String ID: Modulus$PublicExponent
                                          • API String ID: 2241493438-3324115277
                                          • Opcode ID: a2ad35cdbcb52860bba77e4ad999a75c480538f8afe5b1c659200343047b1297
                                          • Instruction ID: 18d132f7d87eea9cd83639df6c47310bbcc18495024e900239094648e5d9d063
                                          • Opcode Fuzzy Hash: a2ad35cdbcb52860bba77e4ad999a75c480538f8afe5b1c659200343047b1297
                                          • Instruction Fuzzy Hash: 6B110AB09053446EC600DFADC85498BFBE8AFD6244F100A5EF8656B355DB30D8C9DB96
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E13B605
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E13B634
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 1785806476-3788999226
                                          • Opcode ID: 9024ad56b65f0e0512319a01e99f90df5ff19cda87955b28a7dfdd8baecc3ff6
                                          • Instruction ID: 8c6d1176925fb7fa545351f6d9220811facc42f9b2b63ed0c139ad3228fc4d22
                                          • Opcode Fuzzy Hash: 9024ad56b65f0e0512319a01e99f90df5ff19cda87955b28a7dfdd8baecc3ff6
                                          • Instruction Fuzzy Hash: 1E01B1B26006058FD324CFE8DCA0CABB3ECEB54210724492DE9AAC3250F670F9449B60
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E164241
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E164277
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                          • String ID: vector<bool> too long
                                          • API String ID: 1785806476-842332957
                                          • Opcode ID: 1d593c4fa74ec66a5f7bec8d4e332a286d75011d2aec225d5d027caa37335d28
                                          • Instruction ID: adf7a5e51067d3218e6a6ed45affa06d582b613d3c6e4a394ec00e3a6e48e183
                                          • Opcode Fuzzy Hash: 1d593c4fa74ec66a5f7bec8d4e332a286d75011d2aec225d5d027caa37335d28
                                          • Instruction Fuzzy Hash: 8101F772A001055FD704CFA9ECE08AEF3A9FB94354F71462EF52687640E730A9A9CB90
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E163855
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E163880
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 1785806476-3788999226
                                          • Opcode ID: 822ff6ad6bccadead292da38828eda38888d2c42b09ed56cef617478304f9db0
                                          • Instruction ID: 317084285d6de7fbdd86dfb57d09d15e999d75510a88e7c9da3ce61a9f15de03
                                          • Opcode Fuzzy Hash: 822ff6ad6bccadead292da38828eda38888d2c42b09ed56cef617478304f9db0
                                          • Instruction Fuzzy Hash: 920171725006099FD314DFE9D8988AFB3EDAB542107104A3DE5AAD3650EA70F8959B60
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 6E115173
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E1690ED
                                            • Part of subcall function 6E1690D8: __CxxThrowException@8.LIBCMT ref: 6E169102
                                            • Part of subcall function 6E1690D8: std::exception::exception.LIBCMT ref: 6E169113
                                          • _memmove.LIBCMT ref: 6E11519E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 1785806476-3788999226
                                          • Opcode ID: 9cdf6de82733bda3c1c93916aa36643daa72b53c4f14e34923457130c26de77b
                                          • Instruction ID: 153d13c7f09019e3f57da4f77ef1c2e373f5922780a8d426516a5aea242e90fb
                                          • Opcode Fuzzy Hash: 9cdf6de82733bda3c1c93916aa36643daa72b53c4f14e34923457130c26de77b
                                          • Instruction Fuzzy Hash: 38018FB16042069FD728CFE8CCA58AFB3E9EB54244724493DE85AC7740E731F880DB61
                                          APIs
                                            • Part of subcall function 6E16ABC3: __getptd.LIBCMT ref: 6E16ABC9
                                            • Part of subcall function 6E16ABC3: __getptd.LIBCMT ref: 6E16ABD9
                                          • __getptd.LIBCMT ref: 6E16BFC3
                                            • Part of subcall function 6E16EAE6: __getptd_noexit.LIBCMT ref: 6E16EAE9
                                            • Part of subcall function 6E16EAE6: __amsg_exit.LIBCMT ref: 6E16EAF6
                                          • __getptd.LIBCMT ref: 6E16BFD1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                          • String ID: csm
                                          • API String ID: 803148776-1018135373
                                          • Opcode ID: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                          • Instruction ID: 8e6b626fffb947167e90cc1eb4376a9b4732a76e6ff7047e22c41ff3247a0db2
                                          • Opcode Fuzzy Hash: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                          • Instruction Fuzzy Hash: F40169388003058FDF64CFE1D450AADB3BABF28315F60892EE0519E290CB3896E0FB41
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: NameName::
                                          • String ID: {flat}
                                          • API String ID: 1333004437-2606204563
                                          • Opcode ID: 69521b9200ad31379fc9ff9bb1441bdf412ab3be426749322b71a944d74e6ff9
                                          • Instruction ID: 364316c0bfb9280c3d74ad061babf5d05badf5f6d83e997fe33f9e05e8fbb99f
                                          • Opcode Fuzzy Hash: 69521b9200ad31379fc9ff9bb1441bdf412ab3be426749322b71a944d74e6ff9
                                          • Instruction Fuzzy Hash: B0F030711406499FDF20CF98C468BA83BA59B96B95F14C045E95C0F352CB31D9C3EB65
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,4F740BFF), ref: 6E1176AD
                                          • LeaveCriticalSection.KERNEL32(?,?,?,4F740BFF), ref: 6E1176FF
                                          • EnterCriticalSection.KERNEL32(4F740BFF,?,?,?,4F740BFF), ref: 6E11770D
                                          • LeaveCriticalSection.KERNEL32(4F740BFF,?,00000000,?,?,?,?,4F740BFF), ref: 6E11772A
                                            • Part of subcall function 6E169BB5: _malloc.LIBCMT ref: 6E169BCF
                                            • Part of subcall function 6E116D40: _rand.LIBCMT ref: 6E116DEA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$_malloc_rand
                                          • String ID:
                                          • API String ID: 119520971-0
                                          • Opcode ID: f809cef3fa2b00c76cdf66b54687b16e0e8b857f0d90099d067e649a82045247
                                          • Instruction ID: 5943879050d1422a114325a77f4ae8fccae5c21fe2036dced683b20916602dce
                                          • Opcode Fuzzy Hash: f809cef3fa2b00c76cdf66b54687b16e0e8b857f0d90099d067e649a82045247
                                          • Instruction Fuzzy Hash: 3E218472504609AFCB10DFA4CC44EDFB7BCFF41254F108A2AF82697640EB70AA45DBA1
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,?,?), ref: 6E1195A9
                                          • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 6E1195CA
                                          • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 6E1195DA
                                          • LeaveCriticalSection.KERNEL32(00000000,?,?,?), ref: 6E1195FB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2120932138.000000006E101000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E100000, based on PE: true
                                          • Associated: 00000000.00000002.2120899419.000000006E100000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121352580.000000006E184000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121457769.000000006E19E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121485981.000000006E1A0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121511934.000000006E1A1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121552470.000000006E1A3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121609210.000000006E1AC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000000.00000002.2121685711.000000006E1AE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e100000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3168844106-0
                                          • Opcode ID: c62fd45ffd44d16279e3b84726580f228088234db1b3fb1c4c18c53b5ecefab2
                                          • Instruction ID: 12a6d874eb17ddf7a1f1749c8127b209e47332a045a7e5e15f6e026122c0c7e8
                                          • Opcode Fuzzy Hash: c62fd45ffd44d16279e3b84726580f228088234db1b3fb1c4c18c53b5ecefab2
                                          • Instruction Fuzzy Hash: 3A116072908509AFC740CFD9D4909DFF7BCFF51210B1045AAE525A7610D770EA51DBA1

                                          Execution Graph

                                          Execution Coverage:20.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:121
                                          Total number of Limit Nodes:7
                                          execution_graph 21329 2a98598 21330 2a985eb 21329->21330 21331 2a985fd GetModuleHandleW 21329->21331 21330->21331 21332 2a9863c 21331->21332 21388 2a9b518 21390 2a9b546 21388->21390 21389 2a9b617 21390->21389 21391 2a9b612 KiUserCallbackDispatcher 21390->21391 21391->21389 21392 2a94378 21393 2a9438f 21392->21393 21396 2a92ce0 21393->21396 21395 2a943b8 21397 2a92ceb 21396->21397 21400 2a92cf0 21397->21400 21399 2a94485 21399->21395 21401 2a92cfb 21400->21401 21404 2a92d20 21401->21404 21403 2a94562 21403->21399 21405 2a92d2b 21404->21405 21408 2a92d50 21405->21408 21407 2a94665 21407->21403 21409 2a92d5b 21408->21409 21411 2a95bcb 21409->21411 21415 2a97e79 21409->21415 21410 2a95c09 21410->21407 21411->21410 21419 2a9a09b 21411->21419 21424 2a9a0a8 21411->21424 21429 2a982ab 21415->21429 21433 2a982b0 21415->21433 21416 2a97e86 21416->21411 21420 2a9a0c9 21419->21420 21421 2a9a0ed 21420->21421 21453 2a9a659 21420->21453 21457 2a9a660 21420->21457 21421->21410 21425 2a9a0c9 21424->21425 21426 2a9a0ed 21425->21426 21427 2a9a659 LoadLibraryExW 21425->21427 21428 2a9a660 LoadLibraryExW 21425->21428 21426->21410 21427->21426 21428->21426 21430 2a982b0 21429->21430 21436 2a983a8 21430->21436 21431 2a982bf 21431->21416 21435 2a983a8 LoadLibraryExW 21433->21435 21434 2a982bf 21434->21416 21435->21434 21437 2a983b9 21436->21437 21438 2a983d4 21436->21438 21437->21438 21441 2a9867b 21437->21441 21445 2a98688 21437->21445 21438->21431 21442 2a98685 21441->21442 21443 2a986c1 21442->21443 21449 2a980b8 21442->21449 21443->21438 21446 2a9869c 21445->21446 21447 2a986c1 21446->21447 21448 2a980b8 LoadLibraryExW 21446->21448 21447->21438 21448->21447 21450 2a988a8 LoadLibraryExW 21449->21450 21452 2a98964 21450->21452 21452->21443 21455 2a9a660 21453->21455 21454 2a9a6a7 21454->21421 21455->21454 21461 2a9a488 21455->21461 21458 2a9a66d 21457->21458 21459 2a9a488 LoadLibraryExW 21458->21459 21460 2a9a6a7 21458->21460 21459->21460 21460->21421 21462 2a9a493 21461->21462 21464 2a9b028 21462->21464 21465 2a9a5a4 21462->21465 21464->21464 21466 2a9a5af 21465->21466 21467 2a92d50 LoadLibraryExW 21466->21467 21468 2a9b097 21467->21468 21468->21464 21469 2a9a778 21470 2a9a7be GetCurrentProcess 21469->21470 21472 2a9a810 GetCurrentThread 21470->21472 21474 2a9a809 21470->21474 21473 2a9a84d GetCurrentProcess 21472->21473 21476 2a9a846 21472->21476 21475 2a9a883 21473->21475 21474->21472 21477 2a9a8ab GetCurrentThreadId 21475->21477 21476->21473 21478 2a9a8dc 21477->21478 21333 2a9a9c0 DuplicateHandle 21334 2a9aa9d 21333->21334 21479 2a9f070 21480 2a9f108 CreateWindowExW 21479->21480 21482 2a9f246 21480->21482 21335 da5ea0 21336 da5ebc 21335->21336 21346 da7423 21336->21346 21337 da5f2b 21341 2a91a69 21337->21341 21338 da5f0d 21342 2a91a8d 21341->21342 21352 2a91b68 21342->21352 21356 2a91b78 21342->21356 21343 2a91a97 21343->21338 21347 da7442 21346->21347 21364 da7948 21347->21364 21370 da7870 21347->21370 21375 da7850 21347->21375 21348 da7452 21348->21337 21354 2a91b9f 21352->21354 21353 2a91c7c 21353->21353 21354->21353 21360 2a903e8 21354->21360 21358 2a91b9f 21356->21358 21357 2a91c7c 21357->21357 21358->21357 21359 2a903e8 CreateActCtxA 21358->21359 21359->21357 21361 2a93030 CreateActCtxA 21360->21361 21363 2a93136 21361->21363 21365 da7957 21364->21365 21367 da78fe 21364->21367 21365->21348 21366 da7929 21366->21348 21380 2a9167b 21367->21380 21384 2a91680 21367->21384 21371 da788c 21370->21371 21373 2a9167b GetConsoleWindow 21371->21373 21374 2a91680 GetConsoleWindow 21371->21374 21372 da7929 21372->21348 21373->21372 21374->21372 21376 da7855 21375->21376 21378 2a9167b GetConsoleWindow 21376->21378 21379 2a91680 GetConsoleWindow 21376->21379 21377 da7929 21377->21348 21378->21377 21379->21377 21381 2a916c1 GetConsoleWindow 21380->21381 21383 2a91702 21381->21383 21383->21366 21385 2a916c1 GetConsoleWindow 21384->21385 21387 2a91702 21385->21387 21387->21366

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 348 da62e8-da630a 349 da630c 348->349 350 da6311-da640c 348->350 349->350 352 da6412-da6551 350->352 353 da6b86-da6bae 350->353 397 da6b4f-da6b79 352->397 398 da6557-da65b2 352->398 356 da72b7-da72c0 353->356 358 da6bbc-da6bc6 356->358 359 da72c6-da72de 356->359 360 da6bc8 358->360 361 da6bcd-da6cb1 358->361 360->361 378 da6cb7-da6cc4 361->378 380 da6cee 378->380 381 da6cc6-da6cd2 378->381 384 da6cf4-da6d14 380->384 382 da6cdc-da6ce2 381->382 383 da6cd4-da6cda 381->383 386 da6cec 382->386 383->386 389 da6d16-da6d6f 384->389 390 da6d74-da6df4 384->390 386->384 402 da72b4 389->402 411 da6e49-da6e8c 390->411 412 da6df6-da6e47 390->412 409 da6b7b 397->409 410 da6b83-da6b84 397->410 406 da65b7-da65c2 398->406 407 da65b4 398->407 402->356 408 da6a61-da6a67 406->408 407->406 413 da6a6d-da6aea call da0188 408->413 414 da65c7-da65e5 408->414 409->410 410->353 437 da6e97-da6ea0 411->437 412->437 458 da6b39-da6b3f 413->458 417 da663c-da6651 414->417 418 da65e7-da65eb 414->418 420 da6658-da666e 417->420 421 da6653 417->421 418->417 423 da65ed-da65f8 418->423 426 da6670 420->426 427 da6675-da668c 420->427 421->420 429 da662e-da6634 423->429 426->427 433 da668e 427->433 434 da6693-da66a9 427->434 430 da65fa-da65fe 429->430 431 da6636-da6637 429->431 438 da6600 430->438 439 da6604-da661c 430->439 435 da66ba-da6792 431->435 433->434 440 da66ab 434->440 441 da66b0-da66b7 434->441 442 da67ca-da6805 435->442 443 da6794-da6796 435->443 445 da6f00-da6f0f 437->445 438->439 446 da661e 439->446 447 da6623-da662b 439->447 440->441 441->435 455 da6819-da6965 442->455 456 da6807-da6813 442->456 443->442 448 da6798-da67c4 443->448 449 da6ea2-da6eca 445->449 450 da6f11-da6f98 445->450 446->447 447->429 448->442 453 da6ecc 449->453 454 da6ed1-da6efa 449->454 487 da7111-da711d 450->487 453->454 454->445 465 da69c9-da69de 455->465 466 da6967-da696b 455->466 456->455 460 da6aec-da6b36 458->460 461 da6b41-da6b47 458->461 460->458 461->397 468 da69e0 465->468 469 da69e5-da6a06 465->469 466->465 470 da696d-da697c 466->470 468->469 472 da6a08 469->472 473 da6a0d-da6a2c 469->473 474 da69bb-da69c1 470->474 472->473 478 da6a2e 473->478 479 da6a33-da6a53 473->479 476 da697e-da6982 474->476 477 da69c3-da69c4 474->477 483 da698c-da69ad 476->483 484 da6984-da6988 476->484 482 da6a5e 477->482 478->479 485 da6a5a 479->485 486 da6a55 479->486 482->408 490 da69af 483->490 491 da69b4-da69b8 483->491 484->483 485->482 486->485 488 da6f9d-da6fa6 487->488 489 da7123-da7181 487->489 492 da6fa8 488->492 493 da6faf-da7105 488->493 506 da71b8-da71e2 489->506 507 da7183-da71b6 489->507 490->491 491->474 492->493 496 da6ffa-da703a 492->496 497 da703f-da707f 492->497 498 da7084-da70c4 492->498 499 da6fb5-da6ff5 492->499 510 da710b 493->510 496->510 497->510 498->510 499->510 515 da71eb-da72a5 506->515 507->515 510->487 515->402
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$TJbq$Te]q$paq$xb`q
                                          • API String ID: 0-1123639052
                                          • Opcode ID: 3af30e2d02ebbc3869bb36cfe1312e848c8a297591a7559b392106cdcea720cb
                                          • Instruction ID: ba9bf3bdaa0a827cf2acddaeb0d3f552800bbfe373270339a2ad005b9fc87891
                                          • Opcode Fuzzy Hash: 3af30e2d02ebbc3869bb36cfe1312e848c8a297591a7559b392106cdcea720cb
                                          • Instruction Fuzzy Hash: 5AB2A575E00228CFDB65CF69C984B99BBB2FF89304F1481E9D509AB265DB319E81CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 304 2a9a769-2a9a807 GetCurrentProcess 308 2a9a809-2a9a80f 304->308 309 2a9a810-2a9a844 GetCurrentThread 304->309 308->309 310 2a9a84d-2a9a881 GetCurrentProcess 309->310 311 2a9a846-2a9a84c 309->311 313 2a9a88a-2a9a8a5 call 2a9a947 310->313 314 2a9a883-2a9a889 310->314 311->310 316 2a9a8ab-2a9a8da GetCurrentThreadId 313->316 314->313 318 2a9a8dc-2a9a8e2 316->318 319 2a9a8e3-2a9a945 316->319 318->319
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 02A9A7F6
                                          • GetCurrentThread.KERNEL32 ref: 02A9A833
                                          • GetCurrentProcess.KERNEL32 ref: 02A9A870
                                          • GetCurrentThreadId.KERNEL32 ref: 02A9A8C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID: @'
                                          • API String ID: 2063062207-3607613960
                                          • Opcode ID: 588ed7fd19689efc88e354140c90d96fdd53fdbe29584badffb6cc207f10a1c0
                                          • Instruction ID: 7cf4c0931700a3947c2af13fb0f3768ee624d40f1794f6ef06d58f1bbc3427c0
                                          • Opcode Fuzzy Hash: 588ed7fd19689efc88e354140c90d96fdd53fdbe29584badffb6cc207f10a1c0
                                          • Instruction Fuzzy Hash: 695159B0900249CFDB54DFAAD948BAEBBF1EF48314F20C45AE009A7361DB349945CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 326 2a9a778-2a9a807 GetCurrentProcess 330 2a9a809-2a9a80f 326->330 331 2a9a810-2a9a844 GetCurrentThread 326->331 330->331 332 2a9a84d-2a9a881 GetCurrentProcess 331->332 333 2a9a846-2a9a84c 331->333 335 2a9a88a-2a9a8a5 call 2a9a947 332->335 336 2a9a883-2a9a889 332->336 333->332 338 2a9a8ab-2a9a8da GetCurrentThreadId 335->338 336->335 340 2a9a8dc-2a9a8e2 338->340 341 2a9a8e3-2a9a945 338->341 340->341
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 02A9A7F6
                                          • GetCurrentThread.KERNEL32 ref: 02A9A833
                                          • GetCurrentProcess.KERNEL32 ref: 02A9A870
                                          • GetCurrentThreadId.KERNEL32 ref: 02A9A8C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID: @'
                                          • API String ID: 2063062207-3607613960
                                          • Opcode ID: 65de6dbf71d7d76457abc1079b452aa157c01871c2d9e467df035cefa985e869
                                          • Instruction ID: b8ab8823a170a5e4bb4d78457fcb5abc34ba611e6a8b79e91e398bfe120f6feb
                                          • Opcode Fuzzy Hash: 65de6dbf71d7d76457abc1079b452aa157c01871c2d9e467df035cefa985e869
                                          • Instruction Fuzzy Hash: A45138B09003498FDB54DFAAD948B9EBBF1EF48314F20C45AD019A7361DB349945CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 543 daf9e8-daf9f1 544 dafa1c-dafa7a 543->544 545 daf9f3-dafa1b 543->545 553 dafa7c-dafa86 544->553 554 dafaa7-dafb1e 544->554 590 dafa89 call daf9d8 553->590 591 dafa89 call daf9e8 553->591 592 dafa89 call dafae8 553->592 593 dafa89 call dafa50 553->593 562 dafb53-dafb69 554->562 563 dafb20-dafb2d 554->563 555 dafa8f-dafaa6 570 dafb6b-dafb7a 562->570 571 dafbe3-dafbf6 562->571 566 dafb33-dafb4e 563->566 567 dafc14-dafc2f 563->567 566->567 578 dafb7c-dafb8e 570->578 579 dafb90-dafb99 570->579 573 dafc02-dafc06 571->573 575 dafc08 573->575 576 dafc11 573->576 575->576 576->567 581 dafbc4-dafbcd 578->581 580 dafb9b-dafba1 579->580 579->581 585 dafbf8 580->585 586 dafba3 580->586 582 dafbcf-dafbe1 581->582 583 dafbfd 581->583 582->570 582->571 583->573 585->583 588 dafbad-dafbc1 586->588 588->581 590->555 591->555 592->555 593->555
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (aq$(aq
                                          • API String ID: 0-3916115647
                                          • Opcode ID: 16472f4d84d9aed81b1ece630586a4f1c2e5e8fd9e4cd5c41766276d36485278
                                          • Instruction ID: 5bd084bfc387c40f49be138c559647b04018415c7c6cffbb6ae14b1af888d475
                                          • Opcode Fuzzy Hash: 16472f4d84d9aed81b1ece630586a4f1c2e5e8fd9e4cd5c41766276d36485278
                                          • Instruction Fuzzy Hash: F7619230E042598FCB15DFA9D8646EEBBF2AF89311F1484AAD415E7391DB709D05CBB0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 693 da962c-da968f 742 da9695 call daf608 693->742 743 da9695 call daf5f9 693->743 698 da969b-dab078 740 dab07e call daf608 698->740 741 dab07e call daf5f9 698->741 705 dab084-dab0bc 707 da7a1b-da7a21 705->707 708 dab0c2-dab0ca 705->708 709 da7a2a-daed2b 707->709 710 da7a23-da80d0 707->710 708->707 734 daed31 call daf608 709->734 735 daed31 call daf5f9 709->735 736 da80d6 call daf608 710->736 737 da80d6 call daf5f9 710->737 721 daed37-daed6f 721->707 724 daed75-daed7b 721->724 722 da80dc-da95d4 738 da95da call daf608 722->738 739 da95da call daf5f9 722->739 724->707 731 da95e0-da9618 731->707 733 da961e-da9626 731->733 733->707 734->721 735->721 736->722 737->722 738->731 739->731 740->705 741->705 742->698 743->698
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: &$,
                                          • API String ID: 0-11628037
                                          • Opcode ID: ba58d1c63168e29d0344edc8e2e48e966e6ec604ac5226de8f2e0e31d2fd48be
                                          • Instruction ID: eb9c75ef0c6d33e32fda781eee576a72e112fc71985aaab318d2964d71c9192a
                                          • Opcode Fuzzy Hash: ba58d1c63168e29d0344edc8e2e48e966e6ec604ac5226de8f2e0e31d2fd48be
                                          • Instruction Fuzzy Hash: 00312774A0221C8FEB60DF68C99079ABBB2FB49300F1044E9C40DA7356EB349E85CF61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 795 2a9f067-2a9f106 796 2a9f108-2a9f11a 795->796 797 2a9f11d-2a9f128 795->797 796->797 798 2a9f12a-2a9f139 797->798 799 2a9f13c-2a9f19c 797->799 798->799 801 2a9f1a4-2a9f244 CreateWindowExW 799->801 802 2a9f24d-2a9f2b8 801->802 803 2a9f246-2a9f24c 801->803 807 2a9f2ba-2a9f2bd 802->807 808 2a9f2c5 802->808 803->802 807->808 809 2a9f2c6 808->809 809->809
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 02A9F231
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 9c0c81c29abdfec89c2f1167c93581faa214d6e18748e39ba5912864c8827f63
                                          • Instruction ID: b18f5ddb0506492a4b57c4ecfbea6c4fdef61c7422e5b41c0907b45f2f6eb9fc
                                          • Opcode Fuzzy Hash: 9c0c81c29abdfec89c2f1167c93581faa214d6e18748e39ba5912864c8827f63
                                          • Instruction Fuzzy Hash: 5F717AB4D00218DFDF20CFA9D984BDDBBF1BB0A304F6491AAE908A7211D7749A85CF45

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 810 2a9f070-2a9f106 811 2a9f108-2a9f11a 810->811 812 2a9f11d-2a9f128 810->812 811->812 813 2a9f12a-2a9f139 812->813 814 2a9f13c-2a9f244 CreateWindowExW 812->814 813->814 817 2a9f24d-2a9f2b8 814->817 818 2a9f246-2a9f24c 814->818 822 2a9f2ba-2a9f2bd 817->822 823 2a9f2c5 817->823 818->817 822->823 824 2a9f2c6 823->824 824->824
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 02A9F231
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: a68cdaa8ce39e1f8ad89fc051b9c53f0cf1e19200e3295eec67e74a0e04ad236
                                          • Instruction ID: 517706aeac6efd092ef090e84a37dc701c0ae81b4ebd511e026921a986128ce4
                                          • Opcode Fuzzy Hash: a68cdaa8ce39e1f8ad89fc051b9c53f0cf1e19200e3295eec67e74a0e04ad236
                                          • Instruction Fuzzy Hash: F3716BB4D00218DFDF20CFA9D984BDDBBF1BB0A304F5091AAE908A7211D774A985CF55

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 953 2a93024-2a930c6 955 2a930cd-2a93134 CreateActCtxA 953->955 957 2a9313d-2a931c2 955->957 958 2a93136-2a9313c 955->958 967 2a931ef-2a931f7 957->967 968 2a931c4-2a931d4 957->968 958->957 972 2a931f8 967->972 971 2a931db-2a931e7 968->971 971->967 972->972
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02A93121
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 6720be09cc7c082b05b089f1cd4f8d05806000f975e17ac70f66128259a0a3c7
                                          • Instruction ID: c4b5f4aaeb51f0a737b79ea6c9534f90ed749ad8211de8bf96308106baea347f
                                          • Opcode Fuzzy Hash: 6720be09cc7c082b05b089f1cd4f8d05806000f975e17ac70f66128259a0a3c7
                                          • Instruction Fuzzy Hash: BF51C6B1D002198FDF21DFA9C940BDEBBF5AF49300F10809AD549AB251DA756A89CF91
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02A93121
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: af5980afc0fa4a47123c3f0e6056e9f60c8ce2e600cb172e27eb41f0d5d6fbd9
                                          • Instruction ID: 003677198305703f0c45d9957233f2fc82271b916e60822b9be5e3b537ef9088
                                          • Opcode Fuzzy Hash: af5980afc0fa4a47123c3f0e6056e9f60c8ce2e600cb172e27eb41f0d5d6fbd9
                                          • Instruction Fuzzy Hash: 4551C571D00219DFDF20DFA9C940B9EBBF5BF49300F1080AAD509AB261DB756A89CF91
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02A9AA8B
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: e70a2099a616b75e8621cd0bd10a3650445f80240c903e974053a23d477c321d
                                          • Instruction ID: 140e2fbab2be271a1ab533a7d1ccf02da15c09401b1cccacd6a9eb02014c1eae
                                          • Opcode Fuzzy Hash: e70a2099a616b75e8621cd0bd10a3650445f80240c903e974053a23d477c321d
                                          • Instruction Fuzzy Hash: 4E4155B9D002589FCF00CFAAD984ADEBBF5BB19310F14906AE918AB211D335A945CF94
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02A9AA8B
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: aabba5a4c36ff6021f1482e8036cd2a3e23b8f8cca286151a6b706fe8d6c0fe2
                                          • Instruction ID: 291373b31d081804b931f53c6c83686ab3a51ece5c8118625479e37dc5e42315
                                          • Opcode Fuzzy Hash: aabba5a4c36ff6021f1482e8036cd2a3e23b8f8cca286151a6b706fe8d6c0fe2
                                          • Instruction Fuzzy Hash: 2B4145B9D002589FCF10CFAAD984ADEBBF5BB09310F14906AE918BB311D735A945CF94
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(?,?,?), ref: 02A98952
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: f3174cabf9c027575681a45a6477b1842e87d082f46dd7a5eec2b0af5ec0aaad
                                          • Instruction ID: dd946ea40e6b448c2bacc88ae0e37903f5cdd5700d477b4c6785726c16e7e3ff
                                          • Opcode Fuzzy Hash: f3174cabf9c027575681a45a6477b1842e87d082f46dd7a5eec2b0af5ec0aaad
                                          • Instruction Fuzzy Hash: 5B4198B4D042589FCF10CFAAD884A9EFBF1BB49310F14902AE918BB310D739A945CF95
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(?,?,?), ref: 02A98952
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: cf765ccab0accd30ded3012fb6253ef44f0d61376ad95b274af8a20bcb91d766
                                          • Instruction ID: 273bb5d092de18763771b65b696d6ce9615c9b1eb39a1afd085555b24ed3775f
                                          • Opcode Fuzzy Hash: cf765ccab0accd30ded3012fb6253ef44f0d61376ad95b274af8a20bcb91d766
                                          • Instruction Fuzzy Hash: 784198B4D042589FCF10CFAAD884A9EFBF1BB49310F14942AE918B7310D739A945CF55
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(?), ref: 02A9862A
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 8654c9245601ed4fd173df74a0c8ae55a05d949f4d6474cd9444bca2986fe2d1
                                          • Instruction ID: f549be677c52aa74bf1d376ee91681ceaa3c1ebe45a857fa726627927787d94a
                                          • Opcode Fuzzy Hash: 8654c9245601ed4fd173df74a0c8ae55a05d949f4d6474cd9444bca2986fe2d1
                                          • Instruction Fuzzy Hash: F231CAB4D002089FCF14CFAAD584ADEFBF5AB49314F14906AE918B7320D738A945CFA4
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(?), ref: 02A9862A
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: ffef4e71f6e2967465d2f12f3146515f1cb8245384c7a5f27b7c89542b2ae8cb
                                          • Instruction ID: 902d5965ce8ba76b1f95af6d724e790848ec9b2547514b5f1fd727382bf3d852
                                          • Opcode Fuzzy Hash: ffef4e71f6e2967465d2f12f3146515f1cb8245384c7a5f27b7c89542b2ae8cb
                                          • Instruction Fuzzy Hash: 2E31A8B4D002589FCF14CFAAD584ADEFBF5AB49314F14906AE918B7320D738A945CFA4
                                          APIs
                                          • GetConsoleWindow.KERNELBASE ref: 02A916F0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: ConsoleWindow
                                          • String ID:
                                          • API String ID: 2863861424-0
                                          • Opcode ID: d7e1d32930b025e87df0b6626bafe0e9adbbe20b14b979652a800f62f37eb818
                                          • Instruction ID: 06440965d99a7175af70384e5bdd51f0b940ef69a5e99ef3a86abb7db10300ce
                                          • Opcode Fuzzy Hash: d7e1d32930b025e87df0b6626bafe0e9adbbe20b14b979652a800f62f37eb818
                                          • Instruction Fuzzy Hash: 7421BDB4D012198FCB14DFAAD584ADEFBF5AB49320F24941AD409B7240DB35A945CFA4
                                          APIs
                                          • GetConsoleWindow.KERNELBASE ref: 02A916F0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2115928469.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2a90000_MSBuild.jbxd
                                          Similarity
                                          • API ID: ConsoleWindow
                                          • String ID:
                                          • API String ID: 2863861424-0
                                          • Opcode ID: 41098da788cf9b9a102e878175f16145a0596731d95551bdc5d65207e55babe7
                                          • Instruction ID: d30b14e85ca70f6c2f410eab4346e9adb86172711fc2321a27ef180d2aa56dfe
                                          • Opcode Fuzzy Hash: 41098da788cf9b9a102e878175f16145a0596731d95551bdc5d65207e55babe7
                                          • Instruction Fuzzy Hash: 5A21BDB4D01259CFCB14CFA9D584ADEBBF5AF49320F24945AD409B7240CB35A945CFA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Te]q
                                          • API String ID: 0-52440209
                                          • Opcode ID: 9307e7eecf1cc3b9f3fac2a80d3c200d2e6f537b1e0bb4a1774e43a6648658b4
                                          • Instruction ID: 326c6f363c0a1c0ae3d8c27100c4deb20af7c85e5b8e863b3620de00ea6f1b0f
                                          • Opcode Fuzzy Hash: 9307e7eecf1cc3b9f3fac2a80d3c200d2e6f537b1e0bb4a1774e43a6648658b4
                                          • Instruction Fuzzy Hash: 8E41B474E45208CFCB14DFA8D5999ADBBB5FF4A300F205569D40AAB366CB30AC46DF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #
                                          • API String ID: 0-1885708031
                                          • Opcode ID: fa99590678a51af152ddba8a51f340c8cb86a43c387582bb9df48f1927440b75
                                          • Instruction ID: c27586bc9cf28c1db2312715d21f8161ebcbe015d3f830e0fcf9b287d31fc592
                                          • Opcode Fuzzy Hash: fa99590678a51af152ddba8a51f340c8cb86a43c387582bb9df48f1927440b75
                                          • Instruction Fuzzy Hash: 1A3129B4A04218CFCB60DF64C9907AABBB2FB4A304F1044E9C64DA7754EB359E85CF65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: '
                                          • API String ID: 0-1997036262
                                          • Opcode ID: 9428876f12714ae6c0ac7f67c405f75d2513544f2f142ae650f843e8ffd53ac4
                                          • Instruction ID: 5b6e09d586ac0744314c9738961c2886897d518d40561939f98431f75564d25d
                                          • Opcode Fuzzy Hash: 9428876f12714ae6c0ac7f67c405f75d2513544f2f142ae650f843e8ffd53ac4
                                          • Instruction Fuzzy Hash: 40210674E422188FEB54DF64C994B9ABBB2FB88300F1044EAD409A7356EB349E85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: +
                                          • API String ID: 0-2126386893
                                          • Opcode ID: 252e5c4b5a1b96e986bcd52db494711569575d61457bef7750eba82bd4e56ea6
                                          • Instruction ID: 798897db408e2d7dc5b3f2793d17f272f546f00530c8abfd6e12fcb174e7e5d3
                                          • Opcode Fuzzy Hash: 252e5c4b5a1b96e986bcd52db494711569575d61457bef7750eba82bd4e56ea6
                                          • Instruction Fuzzy Hash: E111E6749006588FDBA0DF58C994B9ABBB2EB09309F1444E5C009A7790DB759EC5CF64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (
                                          • API String ID: 0-3887548279
                                          • Opcode ID: 445cee141610501f3e86979752cf1cbb0757de79bd52e6fcbf972f916a5f49e3
                                          • Instruction ID: 5dcb42db1514a3497c3664c6fe5da3c898a94e98cb6f520806f1de04e6298a74
                                          • Opcode Fuzzy Hash: 445cee141610501f3e86979752cf1cbb0757de79bd52e6fcbf972f916a5f49e3
                                          • Instruction Fuzzy Hash: 20110074A00218CFDB64DF68C990B9ABBB2FB89304F1045E9C00DA7350EB369E95CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: !
                                          • API String ID: 0-2657877971
                                          • Opcode ID: 4a9651c204bbe52d2e57336de6107f19eceeab61d15ac901d4a845bcec3e8c20
                                          • Instruction ID: 0f77d4561296d8cea87bdd6bbf2e5a9314f09ff1b59f723dede2443e8d8f6430
                                          • Opcode Fuzzy Hash: 4a9651c204bbe52d2e57336de6107f19eceeab61d15ac901d4a845bcec3e8c20
                                          • Instruction Fuzzy Hash: 2C01E474A022288FEB54DF64C9A079ABBB2FF88700F1085E9D409A7356DA349E85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3916222277
                                          • Opcode ID: 7af92938cb05a22adb41db721af5b877e51edfa4ee22031e7b8b873ac7ed5efc
                                          • Instruction ID: 0e88249c930cef1737f0d58da20286b07b099d0d40428c569a8bcdbfcbe039af
                                          • Opcode Fuzzy Hash: 7af92938cb05a22adb41db721af5b877e51edfa4ee22031e7b8b873ac7ed5efc
                                          • Instruction Fuzzy Hash: D7011670E042289FCB91DF64C95078EBBB2FB8A300F1044A9D14DA7344DB786E818F62
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %
                                          • API String ID: 0-2567322570
                                          • Opcode ID: 3c059cd169ac7c9eaa080489499dcb6ea6447aeb63bb8cc821d0f1aa1054f1f2
                                          • Instruction ID: 110eed1f4e28b9aa5a86e6852503c387f4bcf11718c070c9b6e55a263e4e5473
                                          • Opcode Fuzzy Hash: 3c059cd169ac7c9eaa080489499dcb6ea6447aeb63bb8cc821d0f1aa1054f1f2
                                          • Instruction Fuzzy Hash: 4701FB74A00A188FCB64DF64CD5079BBBB2FF49302F1045E9C44AA7355EB346E859F52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $
                                          • API String ID: 0-3993045852
                                          • Opcode ID: d28d0c64bc06a220aeabde501928979b5f745f1884648516c511b285d86d3005
                                          • Instruction ID: 58d4c9b80ccd85c1924db15badd48a4bc2405c51c73505c28e6e796b627f07ae
                                          • Opcode Fuzzy Hash: d28d0c64bc06a220aeabde501928979b5f745f1884648516c511b285d86d3005
                                          • Instruction Fuzzy Hash: 3D014FB09006198FCB60DF54CD9079ABBF2EF44305F1084EAC50A67346DB346E85CF64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: "
                                          • API String ID: 0-123907689
                                          • Opcode ID: 64263515b4f76996e6f523001741e65d09a384bd149e20a2584db3a3b9611a8a
                                          • Instruction ID: df2b5a31ca1c0ce048ac846cd4dc5949bc8d56fe48109d629779f916d1ac7ecd
                                          • Opcode Fuzzy Hash: 64263515b4f76996e6f523001741e65d09a384bd149e20a2584db3a3b9611a8a
                                          • Instruction Fuzzy Hash: DC012470A012288FDB50EF64C99078ABBB7FB89310F1044E9C00DA3B54DE369E92CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: )
                                          • API String ID: 0-2427484129
                                          • Opcode ID: b5c370de2ae2a1fcc1ac43cd23ae3323a2921b28f365775ba1776b2b40c6ac98
                                          • Instruction ID: bd6393e4ba1b3fe7825f582a2a3e3a305e4c176e04262003dadbfb6ff3aee0aa
                                          • Opcode Fuzzy Hash: b5c370de2ae2a1fcc1ac43cd23ae3323a2921b28f365775ba1776b2b40c6ac98
                                          • Instruction Fuzzy Hash: D0012874E4021A8FCB56DF24C9507AABBB6FB48304F1044E9C519A7344EB345E81CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 730b4d84987012468ce27b24bbacae1d2b694b48cbd50c05291c35eaaeede4f0
                                          • Instruction ID: 4944059df6a206cbce825d536e586c5c974909a841b69f12d579958a9e3e3ea4
                                          • Opcode Fuzzy Hash: 730b4d84987012468ce27b24bbacae1d2b694b48cbd50c05291c35eaaeede4f0
                                          • Instruction Fuzzy Hash: 1E511778A012288FDB64DF24C950B9ABBB3FB89300F1045EAD44DA7355DB369E91CF60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd721d424577cb7316dec0c56c6230fdd66cbcc146ccde00eebbe10ffafb97d9
                                          • Instruction ID: 59e68bfcd75b29bc90a78e82b51145aec2797458e10f9d354e59a55b0a821d7e
                                          • Opcode Fuzzy Hash: dd721d424577cb7316dec0c56c6230fdd66cbcc146ccde00eebbe10ffafb97d9
                                          • Instruction Fuzzy Hash: 0451E574E082188FCB95DF64C95469ABBB2FB49300F1085A9D40EA7354EE38AE85DF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f05148aa089d2adde3f8a4f38c149857f8bea7241e43f5993d6cca6d8807696
                                          • Instruction ID: c5b12b9257f02c40d731f42d6a415a341634d6158ad4cfe00f04c00c6e0313f3
                                          • Opcode Fuzzy Hash: 1f05148aa089d2adde3f8a4f38c149857f8bea7241e43f5993d6cca6d8807696
                                          • Instruction Fuzzy Hash: 4F514A74A012298FCB64DF64C964BAABBB2FB49304F1044E9D40EA3754EF349E85DF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d440faacb73f8062135dc0394dae9983cce4f5c463cf582e9f13779b253546e
                                          • Instruction ID: 9719095b19fb7ac53ed6806eb3bee65888cc40090d4b03d21523253781415cb4
                                          • Opcode Fuzzy Hash: 5d440faacb73f8062135dc0394dae9983cce4f5c463cf582e9f13779b253546e
                                          • Instruction Fuzzy Hash: 5A51F274A002288FCB66DF24C95079ABBBAFB49705F1085E9E40DA3354EF349F859F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac127b82819cb11894283c62e31cd5141370151ba217ebb0772a036a79515306
                                          • Instruction ID: cb6b7e8746b2c52c8ae680ee898d312662f8723e7790e488acfb7ad69867c4a7
                                          • Opcode Fuzzy Hash: ac127b82819cb11894283c62e31cd5141370151ba217ebb0772a036a79515306
                                          • Instruction Fuzzy Hash: C5512574A016288FCB65DF24CD507AABBB2FF49301F1044E9C40EA7755EB349E859F51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 208cdb4ea4af0bb5ebaa66ee67ceae27f219cb6f7871367d2d1cbaa84fa055d3
                                          • Instruction ID: 23989149a0b26414b1a0c71cfd236edeff89788c264040c1b01d1f48ac9a9316
                                          • Opcode Fuzzy Hash: 208cdb4ea4af0bb5ebaa66ee67ceae27f219cb6f7871367d2d1cbaa84fa055d3
                                          • Instruction Fuzzy Hash: 02513DB49012288FCBA4DF64C99079ABBB2FB49304F1044EAC60DA7355DF349E85DF64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cf00e29258b67d1d00946cd51b121cdfcfb77fe2410b7a4e2bbdd61dfb3928a3
                                          • Instruction ID: 50b75038bdd1b1ce5daf296004d0d54b691fc0ae4fa90ebd7a52f859e5d8250a
                                          • Opcode Fuzzy Hash: cf00e29258b67d1d00946cd51b121cdfcfb77fe2410b7a4e2bbdd61dfb3928a3
                                          • Instruction Fuzzy Hash: 7F510674A012288FCB65DF64C9947DABBB2FB89305F1044E9D50EA7354EB349E85CF90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8bf54ad4836b0d9e0e8c9c45e3c652f26e4ff9757617efcfb6f903aed7f7048b
                                          • Instruction ID: 47539d035fc1e00116217b9220f7cecabcf2af53b8dfab5bc47a7863f15863dc
                                          • Opcode Fuzzy Hash: 8bf54ad4836b0d9e0e8c9c45e3c652f26e4ff9757617efcfb6f903aed7f7048b
                                          • Instruction Fuzzy Hash: 9D411574A002188FCB66DF64C95079ABBBAFB49304F1044E9D54DA7354EB749F81CF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 168a3c79426a231189dde7f37e68e9dfe38263ebe1c58e26f044a362e7531223
                                          • Instruction ID: 13ed78e152c4f0c6281802823a1400ddbbd8a27494264cefbff2276e1d2de81b
                                          • Opcode Fuzzy Hash: 168a3c79426a231189dde7f37e68e9dfe38263ebe1c58e26f044a362e7531223
                                          • Instruction Fuzzy Hash: 1D410874A013288FDB64DF68C950B9ABBB2FB4A304F1044EAC40EA7B54DB349E85DF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84281e323870c27257fde79a4c2932e915b719b11c95ad5bc70ae391ffb18c1b
                                          • Instruction ID: 6ee383a2133f642372d5cad59bbf07e9bb9ffd18328761a562e1532cbf85bc6b
                                          • Opcode Fuzzy Hash: 84281e323870c27257fde79a4c2932e915b719b11c95ad5bc70ae391ffb18c1b
                                          • Instruction Fuzzy Hash: 1341F474A012288FCB55EF24CA98B9ABBB6FB49300F1045E9C44DA7355EF349E818F61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 66473e580ae52f85f9cb5e7f7a59aa17f4d34556e2898810b45197d5a20e72d0
                                          • Instruction ID: 84440fef816a7fa706053c54289f92d426f6fa5ebfa35c2ffbf06a84b27088ce
                                          • Opcode Fuzzy Hash: 66473e580ae52f85f9cb5e7f7a59aa17f4d34556e2898810b45197d5a20e72d0
                                          • Instruction Fuzzy Hash: 60410674A012288FCB54DF64C9907DABBB3FB89300F1044E9D40AA7355DE369EA5CFA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa14dc29e9b55acaceaaaab40586cc98563e052c0095588620712b9ca8911b6f
                                          • Instruction ID: a38a91d3f2e31378036fbcebb375a990788dfd940d29103c207e615379ea71c0
                                          • Opcode Fuzzy Hash: aa14dc29e9b55acaceaaaab40586cc98563e052c0095588620712b9ca8911b6f
                                          • Instruction Fuzzy Hash: E6415A74A052298FCBA4EF24C99879ABBB2FB49300F1085E9C40DA7354EF349E85DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 486b284f8b50d48adfa4d5c7927171dfbab73d6beb3cd2b78f10573df77a616d
                                          • Instruction ID: d5c9ec592b88ac2825ba2111f95549b3bb948f448ee67cc5d919a078f462742f
                                          • Opcode Fuzzy Hash: 486b284f8b50d48adfa4d5c7927171dfbab73d6beb3cd2b78f10573df77a616d
                                          • Instruction Fuzzy Hash: 3341F874E042188FCB95DF68C99069ABBF2FB49300F1044E9D50DA7355DA38AE85DF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67ddaeaebee6cda4f012dd824f8c5901489f93ac5d2fcb199c17df3321c5e5ba
                                          • Instruction ID: 9fe4a22ebebdcc38f19ad9521a5b1367c59ca0fd44c355ec9de2f8849b7e22e6
                                          • Opcode Fuzzy Hash: 67ddaeaebee6cda4f012dd824f8c5901489f93ac5d2fcb199c17df3321c5e5ba
                                          • Instruction Fuzzy Hash: 11413974A002198FCB64EF64C964B9EBBB2FB49308F1045E9D40DA3755EB349E81DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc53e90c5ab125fbed3dc29687e579f0fdb663fff629a0eca8310d059302cb23
                                          • Instruction ID: d06cf7926ce2dc1648215f122ef1351f13831cae6caea7130595785d61f48a35
                                          • Opcode Fuzzy Hash: dc53e90c5ab125fbed3dc29687e579f0fdb663fff629a0eca8310d059302cb23
                                          • Instruction Fuzzy Hash: C0315E34E042088FDB01DFA8D855AEEBBB1FB8A300F14856AD805A7395DA349D06CB61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112326681.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_d5d000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 32e49d16a2fa812ef370e634a5539c9452fe103f88aa8ace0d1be8e6746472a5
                                          • Instruction ID: 1a6a06b0ef67cb28dc30a2d65f0c14306376b2cd4c94b9dc93d3f997de275e5d
                                          • Opcode Fuzzy Hash: 32e49d16a2fa812ef370e634a5539c9452fe103f88aa8ace0d1be8e6746472a5
                                          • Instruction Fuzzy Hash: D4210071504200AFCF25DF24C9C0B26BBA6FB88315F24C56DEC494B296C33AD84ACA71
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112326681.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_d5d000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b952774b8cf5a7e47abe3673f05fb42b408d0cc8e90ac9b5de98450202ab23c2
                                          • Instruction ID: 1b33152cfb3418a0d74a95dd4bffc4712c71a64fadb389f23255de6b6905a1fd
                                          • Opcode Fuzzy Hash: b952774b8cf5a7e47abe3673f05fb42b408d0cc8e90ac9b5de98450202ab23c2
                                          • Instruction Fuzzy Hash: EF21D371504204DFDF24DF28D584B16BB66EB84315F24C569DD494B296C33AD80BCA71
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4fe01b77aca8298ecb20d11c567fb53535e2fd22785bfc45a877f5d040c35ae8
                                          • Instruction ID: 84c7e6183b4babf18f09f7aaab9251ab15f48d84069d98c6a63753db8c66061c
                                          • Opcode Fuzzy Hash: 4fe01b77aca8298ecb20d11c567fb53535e2fd22785bfc45a877f5d040c35ae8
                                          • Instruction Fuzzy Hash: 8B3138B4A002188FCB64DF28C99079ABBF2FB49304F5044E9D20DA3350DB349E85CF69
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2496a46fd07dae826a20162e2a32c49efdd4eb9d714417d151945cc83ae770b0
                                          • Instruction ID: fb8149a9ac89b74461db654ab12bd1c3c289391f5077e91ce887d677cc8abcd7
                                          • Opcode Fuzzy Hash: 2496a46fd07dae826a20162e2a32c49efdd4eb9d714417d151945cc83ae770b0
                                          • Instruction Fuzzy Hash: 2A310674A003188FCB64DF64C994B9ABBB2FB4A300F1045E9D40EA3B54DB359E85DF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4a02f83d9f69f6f59200682eb12c1b77266af6806b22bead5d0e598cae279dfe
                                          • Instruction ID: 49b13c6d52ff8905d8cc569e94a8a6acca429f6eb12b06119c61309f4ba8ed5a
                                          • Opcode Fuzzy Hash: 4a02f83d9f69f6f59200682eb12c1b77266af6806b22bead5d0e598cae279dfe
                                          • Instruction Fuzzy Hash: 0431E274A002188FDB55DF68C9A4BDABBB2FB49300F1084E9D50DA7354EF349E859F61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e94a598154a8025e2e0ce219b74be1f53c57fd7fc3f3ee69f539259455308b2
                                          • Instruction ID: 0e24929c9f0019f6417774e9e90149db273e6b6acf68bc5093af0ccaeb540f66
                                          • Opcode Fuzzy Hash: 1e94a598154a8025e2e0ce219b74be1f53c57fd7fc3f3ee69f539259455308b2
                                          • Instruction Fuzzy Hash: F2310474A01218CFDB54DF68C990B9ABBB2FB49304F1045E9C50DA7355DB349E85CF62
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112326681.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_d5d000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a979c9ceaf12ae5aac67a01472ada72a9320dd1cca6aabf1102a9fc43b6d175e
                                          • Instruction ID: c56520bd345d5d3c36f623b1cf3d9e8f37898caf0086900fb92f356188c1dd7c
                                          • Opcode Fuzzy Hash: a979c9ceaf12ae5aac67a01472ada72a9320dd1cca6aabf1102a9fc43b6d175e
                                          • Instruction Fuzzy Hash: 9C215E755093808FDB12CF24D994715BF72EB46314F28C5EADC498B6A7C33A980ACB72
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c1d95cc49ffc25791a794a96b41b37c49382baca2a8a0485fc81ebee1d96cc2
                                          • Instruction ID: 47b20ace8e02876f08ccdff15b9ba77c4810ae43a99aa8653269b4695760286a
                                          • Opcode Fuzzy Hash: 1c1d95cc49ffc25791a794a96b41b37c49382baca2a8a0485fc81ebee1d96cc2
                                          • Instruction Fuzzy Hash: 54211D74E04208DFDB44DFA8D855AAEB7F5FB89304F108529D909A7385DB389906CFA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e541e78f20f46984ee5e071b7f183927423ce3fe64e84a113bdb7143b8a9ea4
                                          • Instruction ID: afb8cce54e76590d663a0ba5df6b48e15a7aca1c70115d9c713eed36374f4fa9
                                          • Opcode Fuzzy Hash: 4e541e78f20f46984ee5e071b7f183927423ce3fe64e84a113bdb7143b8a9ea4
                                          • Instruction Fuzzy Hash: 41212474A012288FDB65DF68C990B9ABBB2FB49300F1044EAC50DA3345DB359E85DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8252ec13551d039d8e8351e167acf321c5263f8e2f241535ac54f30972032d7c
                                          • Instruction ID: 19be19f3c3d2ec75da892fce045b3ed8c204dee55b721a62a91d946483333718
                                          • Opcode Fuzzy Hash: 8252ec13551d039d8e8351e167acf321c5263f8e2f241535ac54f30972032d7c
                                          • Instruction Fuzzy Hash: F8210674A00A28CFCB64DF64CD5079BBBB2FB49302F1088E9D44DA7355EA349E819F61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4028752583c235f43c8165eac0719bff3cff43fdaadb50f2e678d1dbaed03551
                                          • Instruction ID: 74f1cf5167178513bcfdb651bc6a669f7e151093607a21ebdfb762d08e424982
                                          • Opcode Fuzzy Hash: 4028752583c235f43c8165eac0719bff3cff43fdaadb50f2e678d1dbaed03551
                                          • Instruction Fuzzy Hash: B7213B74A042288FCB65DF64C95079ABBB2FB89308F1044EAD40DA7355EF359E86DF60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ace3bad0e578aae8cb6b43d8b5a16e3ce2f45072193b01d7642c5ce99e5d4ebb
                                          • Instruction ID: 7e2446dd1a71715f1c9dd8d5b3fabae9c4f36086b7f4c3a1ba9c9a46a243e193
                                          • Opcode Fuzzy Hash: ace3bad0e578aae8cb6b43d8b5a16e3ce2f45072193b01d7642c5ce99e5d4ebb
                                          • Instruction Fuzzy Hash: 82210674E00A288FCB54DF64DD5069ABBB2FB49302F1084E9C44DA7355EE349E86EF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ac28e4e2a68eaf086a2ebc0e83f8839a76f51f6b1a15a923823d7eff700c82a
                                          • Instruction ID: 85ed4dd0c2bc7d135915ed5092a9002507d32c25323afd21247e9fec5dc0cf0d
                                          • Opcode Fuzzy Hash: 7ac28e4e2a68eaf086a2ebc0e83f8839a76f51f6b1a15a923823d7eff700c82a
                                          • Instruction Fuzzy Hash: 1F214BB0A002298FCB60DF24C95079ABBB2FF89305F1004E9C64EA7345DB349E85DF65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2a519a65ef5c6b1ea972abc878a2881717a7bf0416d06a14f651c178a3246a7e
                                          • Instruction ID: 5e6936f8095766d27840c3098cd77b19ce627953f028f706695f3db76fc167e0
                                          • Opcode Fuzzy Hash: 2a519a65ef5c6b1ea972abc878a2881717a7bf0416d06a14f651c178a3246a7e
                                          • Instruction Fuzzy Hash: 4A21F774B0072C8FCB54DF28C9507DABBB2FB4A300F1044E9D40AA7B55DA749E858F92
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27d06fefd58b2e0459d980b7ef5c84254b7fd8a26b3b79830bf66755040201c0
                                          • Instruction ID: b9125b09644b4ccb35a33281326c512eca2f418f1bf5642909880793fccaeb30
                                          • Opcode Fuzzy Hash: 27d06fefd58b2e0459d980b7ef5c84254b7fd8a26b3b79830bf66755040201c0
                                          • Instruction Fuzzy Hash: 2B212874A002288FCB56DF64D9A079EBBBAFB49700F1045EAD40EA7395DA749F818F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a19143b6e23db17fad064bb4f26672283adca919b5b273ce6a7ae382dd7666bf
                                          • Instruction ID: 6bf3ebb3105c2f6ef6cfd7038a5485feef456184d5bcde4aa50fc4e95cfa5662
                                          • Opcode Fuzzy Hash: a19143b6e23db17fad064bb4f26672283adca919b5b273ce6a7ae382dd7666bf
                                          • Instruction Fuzzy Hash: 7B21F574B002198FCB64DF24C994B9ABBB2FB4A304F1044E9D44AA7B95DB349E81DF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4971fe466757ceab2d33f4a129f450ef30f313ba4a59e3b5db98604d6dd0bfcf
                                          • Instruction ID: 42de59940599e7f9fbb6b64cf66d27860a9ff7a9e5c989d91b8c85ff85b9f21d
                                          • Opcode Fuzzy Hash: 4971fe466757ceab2d33f4a129f450ef30f313ba4a59e3b5db98604d6dd0bfcf
                                          • Instruction Fuzzy Hash: 5D211774A012188FCB64EF24C99079ABBF2FB88700F1085E9D58DA7354DE349E85CF90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1212788bde8923c830b67b70f19a38bace92df831bc96088f6f79371318c867
                                          • Instruction ID: 3b9563c64dfca82b3160db3773ee6b5b6e33f96cfb9d933d503adaf8c9027759
                                          • Opcode Fuzzy Hash: b1212788bde8923c830b67b70f19a38bace92df831bc96088f6f79371318c867
                                          • Instruction Fuzzy Hash: 4F212674A016288FCB64DF28C9A479ABBB2FB88301F1045E9C40DA7355EF349E85DF54
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1242dc36e6ce69a2e434162562b0dc921ba8a7f775a43aa7ca83420c9a9787ba
                                          • Instruction ID: a9bb301092b7c1808d2768f582020f7e32f178da6727e514d47c233a51f01c0e
                                          • Opcode Fuzzy Hash: 1242dc36e6ce69a2e434162562b0dc921ba8a7f775a43aa7ca83420c9a9787ba
                                          • Instruction Fuzzy Hash: 2421D774A012188FDB54DF64C954B9AB7F2FB49304F1084EAD489A7354DF349E85CFA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73899ca551b361e456f30ed223a76f82ca0abece23ed2c45ca0bb69e4d20f4ac
                                          • Instruction ID: 4f5d45ca709756eff160c5f1e76829def4fbc8ad6b5f2c6822ff4ea4513222c2
                                          • Opcode Fuzzy Hash: 73899ca551b361e456f30ed223a76f82ca0abece23ed2c45ca0bb69e4d20f4ac
                                          • Instruction Fuzzy Hash: 19212674A012298FCB65DF64C9507DABBB2FB4A300F1048E9D54DA7354EB749E81CF92
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e9936fe56cfe51ea234ed6bfb04aa38f8c6547379469e5663fe16cebd4644a3
                                          • Instruction ID: b83df783f3f64117a8cad2b24db5fb3f8413521d716272b094822a87eee03edb
                                          • Opcode Fuzzy Hash: 3e9936fe56cfe51ea234ed6bfb04aa38f8c6547379469e5663fe16cebd4644a3
                                          • Instruction Fuzzy Hash: 6C21E8749016288FDB64DF64CD50B9BBBB2FB49302F1044EAD509A7355EF345E818F60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 858489233ac8263fd82c5bd93b24678427d04a252e2efd1ff28fecc59b1d2e36
                                          • Instruction ID: 034a28db671ee3479ac8c357a5d86c0474e45bfecf3b2e14906e237335f767dd
                                          • Opcode Fuzzy Hash: 858489233ac8263fd82c5bd93b24678427d04a252e2efd1ff28fecc59b1d2e36
                                          • Instruction Fuzzy Hash: BB21D974A012188FDB54EF58C9507AAB7F2FB49300F1084EAD58DA7755DF345E818F91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6381e68868914cccdc4d5fd955d40c0bbf455fb60c2fece6b580f7350cf6c40
                                          • Instruction ID: bd1b14ae9f9f19be4f3233be4daf458d997097a2e7c23dc1c6c81e60f0af5ac9
                                          • Opcode Fuzzy Hash: f6381e68868914cccdc4d5fd955d40c0bbf455fb60c2fece6b580f7350cf6c40
                                          • Instruction Fuzzy Hash: 0621D574E002088FCB45DFE4C99469EBBB2FF89300F208829D50AAB359EB749D45DF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b17ea8e0bdf82a9cf715f2403173c438a7ae018404f734a7459f36bb5b8e1c5
                                          • Instruction ID: d93ac67d670ddbdcfe096c57c98149a270bafab213e454568f2fe57d71033f5f
                                          • Opcode Fuzzy Hash: 1b17ea8e0bdf82a9cf715f2403173c438a7ae018404f734a7459f36bb5b8e1c5
                                          • Instruction Fuzzy Hash: 57212874A4022C8FCB64EF64C9947DABBB2FB48300F1044EAC50D97755EB349E829FA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fbc30830c7184ac1ea7ca6a1d13189aad2d6229e1b4262668a970109a781d92f
                                          • Instruction ID: fcca7dd6734d2accb3e41a0fdffeb665cd5cc99acdd2e658edba779e04d51206
                                          • Opcode Fuzzy Hash: fbc30830c7184ac1ea7ca6a1d13189aad2d6229e1b4262668a970109a781d92f
                                          • Instruction Fuzzy Hash: A6212674A0022C8FCB66DF64C95079ABBFAFB4C300F5044EAD409A7355EA349F858FA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5c0c87ad6bf5bec59c8c1956ca18cfa4c78729a5bcb98fc7d379a03d2f11df1c
                                          • Instruction ID: bc99b9a70443122f286e9a3111c398fe085d76b5cc36ee14891049f061e8c0ee
                                          • Opcode Fuzzy Hash: 5c0c87ad6bf5bec59c8c1956ca18cfa4c78729a5bcb98fc7d379a03d2f11df1c
                                          • Instruction Fuzzy Hash: 1C212C74940219CFCB64DF64C950BAAB7B2FB48300F1088E9C50EA7754EB349E85DF60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5e7f04fc812c3dc6ed8d515c225b19dc661af42e99856043c0cc7074e12d925
                                          • Instruction ID: 5d8decd78dba265e58e37c565dbaaff9377baf9cc8742427dcbd0edbdb563f9a
                                          • Opcode Fuzzy Hash: c5e7f04fc812c3dc6ed8d515c225b19dc661af42e99856043c0cc7074e12d925
                                          • Instruction Fuzzy Hash: 2121F574A002288FCB65DF64C9507DEBBB2EB49300F1085EAD909A7355EB349E82DF91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7bb00e00a1ca95515cc26f79d618633850ad0b802932c7ddf04fab41f4dabd0d
                                          • Instruction ID: 0f278a907c6b0f62ae0c25d07b7d4fd33b5fdb6df27aa75239649098f4f0b5b7
                                          • Opcode Fuzzy Hash: 7bb00e00a1ca95515cc26f79d618633850ad0b802932c7ddf04fab41f4dabd0d
                                          • Instruction Fuzzy Hash: 6F2117B4A002288FCB64DF24C99079ABBB2FB49304F1088E9D64DA7755EF349E859F54
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e940d8fdc537d3d9b547598abb8879c9d5f070ed38fb89bf71f53e493271c01d
                                          • Instruction ID: fa69c4e5918416646434acd18a50f5ac4b44bf4236dfb7b7934b9906b49c3ed7
                                          • Opcode Fuzzy Hash: e940d8fdc537d3d9b547598abb8879c9d5f070ed38fb89bf71f53e493271c01d
                                          • Instruction Fuzzy Hash: CA2119B4A4022A8FCB64DF64C990BAA7BB2FF89300F1044E9C54D97355DE349E85DF64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5819b76b5022f78e7a938e5289cc8735a4aba6082d57efc4c1f4bab381574e9
                                          • Instruction ID: 7fa5cb1dd8a32ea9f0ad5928bbcccfb45f34d5ecbd4a0d9f907d79d09410c91a
                                          • Opcode Fuzzy Hash: f5819b76b5022f78e7a938e5289cc8735a4aba6082d57efc4c1f4bab381574e9
                                          • Instruction Fuzzy Hash: FC210474A0022C8FCB65EF25C95069ABBF2FB49300F1084E9C48DA7354EE359E81CF90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 36b39dc51e15045218e350a95a1e7f3f4bce5b78a0c3092fa93cceab3e5b7717
                                          • Instruction ID: 6c798ceeb940acc1410c428e034a20c2fc486d0c43054534ce09ebf512d94f0b
                                          • Opcode Fuzzy Hash: 36b39dc51e15045218e350a95a1e7f3f4bce5b78a0c3092fa93cceab3e5b7717
                                          • Instruction Fuzzy Hash: 1A213C74A002288FCB54EF64C96079ABBB2FF4A308F1044E9D54DA7355DB349E85CF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d6cc8239041627050529206318b7eeaa3ea1bd766107a6505b1addeb70c224d
                                          • Instruction ID: dc2fb56a311b29c48124872f3958d83300366d8d24f2285f563bba1f18c1d6b0
                                          • Opcode Fuzzy Hash: 4d6cc8239041627050529206318b7eeaa3ea1bd766107a6505b1addeb70c224d
                                          • Instruction Fuzzy Hash: 88212874A026188FEB94DF64C95479ABBB2FB89300F1084E9D40DA7356EF349E85DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff52e9390b5b296d6d5b3c10165b4cb8d77f260d7f285a029e91e9ab56b67d42
                                          • Instruction ID: 20b180c3a539d335ba6b85452f4168395dd491121bb7c8ce4f11575bf7e8e382
                                          • Opcode Fuzzy Hash: ff52e9390b5b296d6d5b3c10165b4cb8d77f260d7f285a029e91e9ab56b67d42
                                          • Instruction Fuzzy Hash: B8213974A402688FCB54EF64C99879EBBB2FB48300F1045EAC40DA7354EB349E82CF54
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bdf362e4296429e41fc33a3e60073ebaa3222ba2119e0dee6d8e2dd62230b604
                                          • Instruction ID: 1823c113ce9240e980b4ad3f070d20351d0f3304d048994782a8330720168655
                                          • Opcode Fuzzy Hash: bdf362e4296429e41fc33a3e60073ebaa3222ba2119e0dee6d8e2dd62230b604
                                          • Instruction Fuzzy Hash: B5210474A40229CFCB64EF64C950BAABBF2FB49300F1084E9D549A7355EF349E819F90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5bd001b5d8933f353119514b73aeb414db47e79f6c8f6ae94845c88d5c800af3
                                          • Instruction ID: f4609320e99a5e083d769af472ffc008ace8876c7f71ce3c01d394a951ca06f7
                                          • Opcode Fuzzy Hash: 5bd001b5d8933f353119514b73aeb414db47e79f6c8f6ae94845c88d5c800af3
                                          • Instruction Fuzzy Hash: 60216B74A026288FDBA1DF64CD50B9ABBB2FB89300F1044E9C40DA3346DB349E86CF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 02fa7cbdfd43313225caccc27cdbf5d88b97d2398f6b75e64757b1b567138533
                                          • Instruction ID: f737c35a0dd6f03ae172976d4a44fa1e82a85241cf71510a784c964196c92449
                                          • Opcode Fuzzy Hash: 02fa7cbdfd43313225caccc27cdbf5d88b97d2398f6b75e64757b1b567138533
                                          • Instruction Fuzzy Hash: 18215A70B012298FCB60DF28C950B9ABBB2FB4A300F1044E9C04DA7B54DE749E86DF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 661113c067db9296277cb78eed07d3534e1ad0fb50f902c81746f340040c0778
                                          • Instruction ID: 388fa4a2d7fa66e12122f89182c68e678f943be7377c16736dcd8f1d76e73329
                                          • Opcode Fuzzy Hash: 661113c067db9296277cb78eed07d3534e1ad0fb50f902c81746f340040c0778
                                          • Instruction Fuzzy Hash: 69213BB4A00209CFCB00EF59D648AAEBBF5FB49304F148855D808A7769DB79ED44CF64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112326681.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_d5d000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: 4db8c51d45f143c99ddb1769a7139b2229c208c92af90863def06fa5f705e39e
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: 4D118B75504280DFDB16CF14D5C4B15BBA2FB84314F28C6ADDC494B696C33AD84ACB62
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ee1138af3686482edde6f548bc387b720a957ddec6d6cb2744b25efb1fac7bfb
                                          • Instruction ID: c904651de561fef170c4df5b5e636141c3caf87516c3ed4166290704fe02e472
                                          • Opcode Fuzzy Hash: ee1138af3686482edde6f548bc387b720a957ddec6d6cb2744b25efb1fac7bfb
                                          • Instruction Fuzzy Hash: B5115774E49209DFCB00CFB8D8449EEBBB5EF4A300F1485AAD819A7351DB359A12DF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1f1ff98d4e1ee8a54d0a0ad9e125d4bce9cc5362e0f6329e37d4045445dc1b0
                                          • Instruction ID: 3483bbee13e2483451c5f8e0948e44e27432ccb740f48e627d178079764bf9a3
                                          • Opcode Fuzzy Hash: d1f1ff98d4e1ee8a54d0a0ad9e125d4bce9cc5362e0f6329e37d4045445dc1b0
                                          • Instruction Fuzzy Hash: 18111674A01208DFCB04DFA8E994A9EBBB2FB49315F104829E809A7354EB349985CF65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7f449ec4f5f31a32dac23a89bb8463f14634f85268c859566564ce8a9c24e89f
                                          • Instruction ID: ad1aa1d9c23184ffce8a74e9158fcddc78836e41887ad576d099e3928444adc4
                                          • Opcode Fuzzy Hash: 7f449ec4f5f31a32dac23a89bb8463f14634f85268c859566564ce8a9c24e89f
                                          • Instruction Fuzzy Hash: 5D11F074A01218CFDB54DF58C994B99BBB2FB49308F1044A9D40DA3390EB349E85CF65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ffeae6f2554551d39ec964a118ff41beb9d9e208050666401c1335f9b364b8b8
                                          • Instruction ID: 6f38be57ec53abfb52db1e39ce1d7d066fe48a3307478773aaeb8d8203d42f23
                                          • Opcode Fuzzy Hash: ffeae6f2554551d39ec964a118ff41beb9d9e208050666401c1335f9b364b8b8
                                          • Instruction Fuzzy Hash: AF11C874A002188FCB64DF69C994799BBF2FB49304F1484A6D40DA3794EB349E81DF65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 41d11cfa3f33377f637b77470afa9b04b3899b9f42ffc5b0872760bfd6bb5346
                                          • Instruction ID: 31ee6d16abb5e2988ba040391ebb77e6a486f9e9614c4bbee96f14d9211de856
                                          • Opcode Fuzzy Hash: 41d11cfa3f33377f637b77470afa9b04b3899b9f42ffc5b0872760bfd6bb5346
                                          • Instruction Fuzzy Hash: 20113A74A00618CFCB60DF58C950799BBB2FB4A305F1054E9C40DA7B50DB34AE85CF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b71479c90173227fb8052ec0e49a9c77e44eec487c43911ec41e982055832baf
                                          • Instruction ID: 4bf99b136dd6d6347e883c81aa19a5ac9a1a47241ef884e8134316550d1a7395
                                          • Opcode Fuzzy Hash: b71479c90173227fb8052ec0e49a9c77e44eec487c43911ec41e982055832baf
                                          • Instruction Fuzzy Hash: 2411253494021ACFCB64DF58C984BEEBBB1FB09308F1048E9C419A3744DB749E859F64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dada7f57592e4bc37389ad18d8d30708170bc9e51d3dedc819e83d29bf552e42
                                          • Instruction ID: e6ad15eb0d40089c91e5be8972d9185a7ef34e90a012f2baa959358bd88abef6
                                          • Opcode Fuzzy Hash: dada7f57592e4bc37389ad18d8d30708170bc9e51d3dedc819e83d29bf552e42
                                          • Instruction Fuzzy Hash: CB110374A00318CFCBA0DF58C99079ABBB2FB49308F1044E9D409A7351DBB49E80CF60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e2410b9afe48f2cff6ca659ffcc22679cc01da9532c330d5d399509b6bf2baa
                                          • Instruction ID: 2c1ea8c9baf6d98290a3cdbc1c7374274afd6741e5ca4ea3bd3c914f33100462
                                          • Opcode Fuzzy Hash: 2e2410b9afe48f2cff6ca659ffcc22679cc01da9532c330d5d399509b6bf2baa
                                          • Instruction Fuzzy Hash: BA111574A01218CFEB60DF58C89079ABBB2FB4A304F1054E9D40DA7752EB349E85CF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 34c2dae51e4ea259760a88fd0dbfdb9b85c78d75a0560d4043d8dceadd120d8c
                                          • Instruction ID: 2de45b476c1a63713e71addde2c70d2fdc9153fe3e61eec92dd2ede934a99db2
                                          • Opcode Fuzzy Hash: 34c2dae51e4ea259760a88fd0dbfdb9b85c78d75a0560d4043d8dceadd120d8c
                                          • Instruction Fuzzy Hash: 8C11F2B4A002188FCB60DF58C994789BBF2FB49304F5084A9D209A7351DB349EC58FA9
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bede675c44ec58c6a819248d60cdca7ff18ab2ca7df11712de0583004998a667
                                          • Instruction ID: 60f6f28c508c085b1a11ff4a70c27713d360e52756b7cd012674dd24a4c99fa9
                                          • Opcode Fuzzy Hash: bede675c44ec58c6a819248d60cdca7ff18ab2ca7df11712de0583004998a667
                                          • Instruction Fuzzy Hash: 3611DF74A00218CFCB50DFA8C994799BBB2FB49300F1088AAD50EB7350EB749E858F65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a43bc0b3d02423a06e170a80d39aa7af0c62d78fee5646d8ff8ccb118943077
                                          • Instruction ID: c90fe4911ab762d50209055b224726c333247243a896f5d9e00d89326fbdf736
                                          • Opcode Fuzzy Hash: 0a43bc0b3d02423a06e170a80d39aa7af0c62d78fee5646d8ff8ccb118943077
                                          • Instruction Fuzzy Hash: C111E374A006188FDB60DF58C990BDABBB2EB49309F1044A9C50DA7790EB349EC1DF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 520811dfd871356e87432a60d8083f964876884c8c05dc2f7d8c39cbc3e1aee7
                                          • Instruction ID: 49c7ec67b153136541cece7aa40c212cd6efb1557520974b316e55a967585595
                                          • Opcode Fuzzy Hash: 520811dfd871356e87432a60d8083f964876884c8c05dc2f7d8c39cbc3e1aee7
                                          • Instruction Fuzzy Hash: FBF0F6305083489FD705AFA8DC2569D7FB5EF8B301F404528D5009B2AADFB5590CC7B2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c9b34e9374a0a40108c23b5f3f17ad79aa2044ccbaec8e4f65ba4f1287ff8ebc
                                          • Instruction ID: 4b2192c14610be3da305ae4feeb7a3ec8ddddb7d566d8a5e34f1a484803de0b5
                                          • Opcode Fuzzy Hash: c9b34e9374a0a40108c23b5f3f17ad79aa2044ccbaec8e4f65ba4f1287ff8ebc
                                          • Instruction Fuzzy Hash: 6BF01431D1021B8ECB04EBA8C8061EFBBB1EF9A310F10856A9514A7140EB30264A8B91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0da9eb2dba015169e70e276a232a98fcc5e4999aecc9125f7f730d1d04061304
                                          • Instruction ID: 4066de4d2c533eae0c34570c8abfbabfd0742dec8c226da29d41943000729f87
                                          • Opcode Fuzzy Hash: 0da9eb2dba015169e70e276a232a98fcc5e4999aecc9125f7f730d1d04061304
                                          • Instruction Fuzzy Hash: 7FF06834D04204EFCB04DFA8D49166D77B1EF4A305F2484A99C19C7355D7719945DFA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 02dc70826a47b5d8d4ea795a376a15b98527931da797beca67d0ef852e702fa5
                                          • Instruction ID: a015b2b7b0fbb225f9f606abfa49b6af785d5560c690611e2bf2427e21679660
                                          • Opcode Fuzzy Hash: 02dc70826a47b5d8d4ea795a376a15b98527931da797beca67d0ef852e702fa5
                                          • Instruction Fuzzy Hash: F401C4749002188FDB64EF64C950BAABBF2FB48300F5484A9C58DA7354DE345E859FA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc6b054f64ec5d603375322881beeafd7035fcf6d888658a0a75aaada9250b9e
                                          • Instruction ID: d35dc9466266e9a82aa88748748f0c1a1ff0d3908f23efaaa2c2fd41f92563f0
                                          • Opcode Fuzzy Hash: bc6b054f64ec5d603375322881beeafd7035fcf6d888658a0a75aaada9250b9e
                                          • Instruction Fuzzy Hash: B801F674A002298FCB54DF64CA50BDABBB2FF49300F2088EAC509A7355EB749E85CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d4c59636e22c01d2dd915eedd4d9e03866babbed180ca72538f68004f8065cc
                                          • Instruction ID: ea6826644559eaf6288433b1de42e5a18a162e8bcca9a2ca78dae4c919ea6456
                                          • Opcode Fuzzy Hash: 4d4c59636e22c01d2dd915eedd4d9e03866babbed180ca72538f68004f8065cc
                                          • Instruction Fuzzy Hash: F501FF74A0021C8FCB64DF54C960BDA7BB2FB48304F5044EAC40967354DB345E859FA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c509dcbc77479ddd6c827c39a1ad90fd808ddb9b92e4c96fabee300e820dfce
                                          • Instruction ID: 2807eb33e0cc8006fa4e3ea8be90a15658b9e935f66440d3df5127d918770b6d
                                          • Opcode Fuzzy Hash: 4c509dcbc77479ddd6c827c39a1ad90fd808ddb9b92e4c96fabee300e820dfce
                                          • Instruction Fuzzy Hash: AF0128B49002188FCBA4DF28C89079EBBB2FB48305F1044E9D20DA7385DE345E86DF55
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 242c70ceffc4833cee6198aeab22517bcfbfae40b293f32e883e2f023fb94e74
                                          • Instruction ID: 7f0cece57323fab923c6fbe508c0b3cd0d1adfdbe754bb0210f2c41506447438
                                          • Opcode Fuzzy Hash: 242c70ceffc4833cee6198aeab22517bcfbfae40b293f32e883e2f023fb94e74
                                          • Instruction Fuzzy Hash: 2901D674D4421A8FCB95DF64CA50B9ABBF2FB48300F1084E9C54DA7354EE386E859F51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4397cfe0d7bead60381905c6a0764ceb2ccce4b56ec674169677c8830256388a
                                          • Instruction ID: 447c6c5ba1a1442f38bbdef20ab5daba33320af6734ba871500a144dca1745e6
                                          • Opcode Fuzzy Hash: 4397cfe0d7bead60381905c6a0764ceb2ccce4b56ec674169677c8830256388a
                                          • Instruction Fuzzy Hash: 45016D749012188FCB56DF24C96078ABBB6FB48705F1088E9D10DA3356DB349F85CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b599658c916c33ed521d18df873bc8f0a046f7621af4734d0cfa0a48dc576249
                                          • Instruction ID: 98ccadab2cb768a0c46fb236b5e319c1d87e008b42983698da01f8e4f0156be3
                                          • Opcode Fuzzy Hash: b599658c916c33ed521d18df873bc8f0a046f7621af4734d0cfa0a48dc576249
                                          • Instruction Fuzzy Hash: E101167094021A8FCB54DF64D950BAABBB2EB88300F1085E9C11DA3344DE355E918F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 70541263e32003b42dc0ca49203526e115e44dd301448b96ba25637963388f54
                                          • Instruction ID: e7b244382d9b7437ca0f88b0c7d3eec5e52a9667f35309a18494ba32ffd04023
                                          • Opcode Fuzzy Hash: 70541263e32003b42dc0ca49203526e115e44dd301448b96ba25637963388f54
                                          • Instruction Fuzzy Hash: 9701287094021ACFCB64EF64C998BAABBB2FF49340F1044F9C41DA3354DA749E819F60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 650ef8a0081142c07930d56b5bfc1547f0a21092462b029a26431e8662612403
                                          • Instruction ID: fa5fc64220827cfd2053d61251fdccaa00f38108f1b6c04083f3720320c15e99
                                          • Opcode Fuzzy Hash: 650ef8a0081142c07930d56b5bfc1547f0a21092462b029a26431e8662612403
                                          • Instruction Fuzzy Hash: 9801C474A00298CFCB54EF64C95079ABBF2FB48300F1089AAC48DA7394DF745E859F90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 55177e451ef71bf474809c610e0ea26f3ebd4d087f1854b8642669b1a82a15ab
                                          • Instruction ID: 0af61c787982b8927174ddf0b71fdcdcaf3fb986de4b4ceb1c5ff5a10454d06d
                                          • Opcode Fuzzy Hash: 55177e451ef71bf474809c610e0ea26f3ebd4d087f1854b8642669b1a82a15ab
                                          • Instruction Fuzzy Hash: B9012474A082288FDB54DF24C95478ABBB3EB88308F1045EAD10DA7344DF369E958F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 63b1a2a72ee9cead16fc8cf02767559650ebc757e6d750e1e8281189fd3f5f1b
                                          • Instruction ID: 25aad268088f0530164ce8e2fc0adeb71d62e8f1bbe4340abdbf2dad805b8651
                                          • Opcode Fuzzy Hash: 63b1a2a72ee9cead16fc8cf02767559650ebc757e6d750e1e8281189fd3f5f1b
                                          • Instruction Fuzzy Hash: BE01E474B012288FCB55DF24C95079ABBB2EF8A300F5084E9D58DA7354DA749E85CF62
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a63d1d759d75644b4c8a6357e5d6e70e61f4276f5eea9f5cc58ce95e0aaec4b7
                                          • Instruction ID: 64483edd163da7732d887657bb3d48934b5d1339ead55ec10e59cf798fe57a32
                                          • Opcode Fuzzy Hash: a63d1d759d75644b4c8a6357e5d6e70e61f4276f5eea9f5cc58ce95e0aaec4b7
                                          • Instruction Fuzzy Hash: 1E012874B002188FCB60DF24C95469ABBB2FB4A300F1088E9C04EA3744DF345E85DF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d791531bdab3a5becfa5fc33a8d824a1e7d509f263f3aff81081b4d8e00812d9
                                          • Instruction ID: 7107d369e2774319207c0481355906aee552d36c5514f558cbf9986f784464ee
                                          • Opcode Fuzzy Hash: d791531bdab3a5becfa5fc33a8d824a1e7d509f263f3aff81081b4d8e00812d9
                                          • Instruction Fuzzy Hash: 75F0C474A002088FDB65DFB9C59069EBBB2FB49300F30452ED51AA7356EB349D468F51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6616a715597ef2fd6beb0e1f7267f1bb477d20170eccf76f2ce4a9d3e014330
                                          • Instruction ID: 665b9ce2578b16a1c2477068240c3808dd1f2bdbfbd8eca6aaff56223e2ec2c6
                                          • Opcode Fuzzy Hash: c6616a715597ef2fd6beb0e1f7267f1bb477d20170eccf76f2ce4a9d3e014330
                                          • Instruction Fuzzy Hash: F4016930A0162A8FCB64DF64DDA07AABBB2FB48301F0044EAD50D93744EE34AE81DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3809cc8fac125c94cb1125b0d6b62627f89f2a5e96e98a02ef3ace44f7563551
                                          • Instruction ID: 47712b90183ee49f90c831ec8d46ca9cad9e218478a6534f29345a26cb95f655
                                          • Opcode Fuzzy Hash: 3809cc8fac125c94cb1125b0d6b62627f89f2a5e96e98a02ef3ace44f7563551
                                          • Instruction Fuzzy Hash: 23013C74A012288FCB64EF24C99979ABBB2FF49300F1048E9D40DA7755DB349E81CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c23d91c59cf4f838e001e198eb671839c94167f96ed71eec613bdb8da8556669
                                          • Instruction ID: f20a186a80c12ecf0c86db86cc694ceb43e24c32a3d45530bff06c8b62d5e5ff
                                          • Opcode Fuzzy Hash: c23d91c59cf4f838e001e198eb671839c94167f96ed71eec613bdb8da8556669
                                          • Instruction Fuzzy Hash: AF01E474E092288FCB95DF28C960B9ABBB2FB48700F1044E9D40D97355DB38AE81CF91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 71a087a2fcda7965abc1d56a72b1df1c7c444b487a048fc9deeb784c0b472221
                                          • Instruction ID: 3d19d3ddd0e9001504c7c7097ab5718240e10a07a10db446025a490204bb1e6d
                                          • Opcode Fuzzy Hash: 71a087a2fcda7965abc1d56a72b1df1c7c444b487a048fc9deeb784c0b472221
                                          • Instruction Fuzzy Hash: 31011DB49001188FCB54DF54C950799BBB2FB48304F1084EAD749A7355DB749E86CF68
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 946c15c1b20ed54ec7706bd6152ce978b0462936500320c67cd0509941b742f0
                                          • Instruction ID: 7067b998884332b5e6b82169ee4d6044dc3bf120543d6bcc0bd4f078c37756e7
                                          • Opcode Fuzzy Hash: 946c15c1b20ed54ec7706bd6152ce978b0462936500320c67cd0509941b742f0
                                          • Instruction Fuzzy Hash: 3F01FB74A012188FCB54EF54C95079ABBB3FF8A300F1044EAD549A7355EF355E918F52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: baa5e16c90040db8b80f811546d056c5afe558ca75f49a14425b179867e227da
                                          • Instruction ID: 83f5852465debfea294b207a7bb51908c3601476b0ce4f4d909da8d096814fb4
                                          • Opcode Fuzzy Hash: baa5e16c90040db8b80f811546d056c5afe558ca75f49a14425b179867e227da
                                          • Instruction Fuzzy Hash: 59011974A0022C8FCB59DF24C991BDABBB2FB4D300F1085E9C54997355EA349E828F90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5c8469962841ed38faa6b57f0b85ee8335ebfab21fc3e3ad4a7d6ace430cbba
                                          • Instruction ID: 55a029880d587a6d9bb8955c57740cc030707bc0a28b4dc99e9b1368020a1fc5
                                          • Opcode Fuzzy Hash: c5c8469962841ed38faa6b57f0b85ee8335ebfab21fc3e3ad4a7d6ace430cbba
                                          • Instruction Fuzzy Hash: 4E01FB74D04218CFCB55DF24C95079AB7B2FB49300F1046E9D64DA7354DB78AE818F51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b329679f742bb0b9d49f08502f1aeca3f6c86b052438bcd5db09225c2abc364e
                                          • Instruction ID: 19becf90fc637ef26f678a5530da12a412a82a3fb874114ae7729aa0ef0f8c20
                                          • Opcode Fuzzy Hash: b329679f742bb0b9d49f08502f1aeca3f6c86b052438bcd5db09225c2abc364e
                                          • Instruction Fuzzy Hash: AB011D749009188FCB64DF58CD6079ABBB2FB49306F1084E9C40DA7755EB345E85DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ecf9263c23b5687cc12d110477ee36d87131b776f7343cb5e83a511ce0253fd3
                                          • Instruction ID: 9f41dab0e80f7a528f4bcc7b3e84f0dbb7a64219ee9f8ecf660645e8f5064da3
                                          • Opcode Fuzzy Hash: ecf9263c23b5687cc12d110477ee36d87131b776f7343cb5e83a511ce0253fd3
                                          • Instruction Fuzzy Hash: DA0128749012188FDB56DF94C954B89B7B6FB49700F1054E9D50DB3344DB749F818F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a1c0661d6fcfccf284854d9e3b7594adca682a80050a8f9dce979f8bdeb0162
                                          • Instruction ID: c66627788d75d669cab97659301ef7497242b66b775ea35f624601f3a5af764e
                                          • Opcode Fuzzy Hash: 0a1c0661d6fcfccf284854d9e3b7594adca682a80050a8f9dce979f8bdeb0162
                                          • Instruction Fuzzy Hash: 7C01E474E04A288FCBA5DF64CD907DABBB2FB48305F1044E9D40EA7354DA78AE858F51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6f45d8a8cd46937c5477ac24f10217d9152330eb0d51cd749ec7c454a663e57
                                          • Instruction ID: 5d9c12482911a0be4c5cc7f0e6625daf72c68fa3c9efade5924a7b2f42da6020
                                          • Opcode Fuzzy Hash: b6f45d8a8cd46937c5477ac24f10217d9152330eb0d51cd749ec7c454a663e57
                                          • Instruction Fuzzy Hash: A10131749002188FCB54DF94C95079ABBB6FB48318F1084E9D44DA7365DF749E85DF60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 705f87965146fdbe22f078c32a62659ef0962c66fbfb0662f5122648f83f5066
                                          • Instruction ID: 9cdb11f4a6af145563c0c85469cbbcd8190da3e0b9a28751bb64a511f71cfce9
                                          • Opcode Fuzzy Hash: 705f87965146fdbe22f078c32a62659ef0962c66fbfb0662f5122648f83f5066
                                          • Instruction Fuzzy Hash: EC01E8749002188FCB95DF14C9506997BF6FF48301F10C5E9C489A7355DE345E898F91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6110996fee470c85e9548c0db6cb9934009d6db383caa44b454d8a5b1b480d04
                                          • Instruction ID: 4891d6d1d4454105fdd466c1021b378389ffdfcfc30e916e96e9730b0fcee4b5
                                          • Opcode Fuzzy Hash: 6110996fee470c85e9548c0db6cb9934009d6db383caa44b454d8a5b1b480d04
                                          • Instruction Fuzzy Hash: DC0128B49002188FCB60DF68C99079A7BB2FB49300F1044F9C60D97704DB349E85DF65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e91c2bffc6f316dc9ecd00ba485a6f14aeb3e7eef8131a35cdabc4c594aa1043
                                          • Instruction ID: fd8e60454056d98e31da2071ea7bc5b23edc6567e6e7392ae95e7facc94a4963
                                          • Opcode Fuzzy Hash: e91c2bffc6f316dc9ecd00ba485a6f14aeb3e7eef8131a35cdabc4c594aa1043
                                          • Instruction Fuzzy Hash: FA0131749012988FDB54DF54C95679EBBB6FB88304F1044EAC44DA7356DB349E81CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1b0f684746f7a2d3fbcdf6a30b84edf6f37d0487de3e3c6fb878fd38c345775
                                          • Instruction ID: 26f05400d7ff44299fbac72cfb80d41a972b5e679b7fe41b26cfcf92434863dd
                                          • Opcode Fuzzy Hash: e1b0f684746f7a2d3fbcdf6a30b84edf6f37d0487de3e3c6fb878fd38c345775
                                          • Instruction Fuzzy Hash: ED011974A063288FEB64DF24EA9079ABBB2FB89310F1044E9C40D97356DB349E81DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c174fe0bf09c52f50f7e981a7f59881bef3516c8caefec8a75fed2822c7fdca3
                                          • Instruction ID: 41919ac2ae30c3c35b3f061b95a68d92f4450f114e41663cb37813b939fc2d05
                                          • Opcode Fuzzy Hash: c174fe0bf09c52f50f7e981a7f59881bef3516c8caefec8a75fed2822c7fdca3
                                          • Instruction Fuzzy Hash: 8B01E474E042288FCBA5DF24C99079ABBB2EB49300F1044E9D44DA7354EB38AE81DF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c38aa842692d08d60fcb7d2490d5c597d9c03ef0c23fecaca2e0cf9363e761f
                                          • Instruction ID: 6203fac3e35a351c16ff3b1fe24f93d5bec6da8484c4db82eac4c82bce719277
                                          • Opcode Fuzzy Hash: 4c38aa842692d08d60fcb7d2490d5c597d9c03ef0c23fecaca2e0cf9363e761f
                                          • Instruction Fuzzy Hash: C2F03470A04248AFCB45CFA8D885698BFB1EF4A310F14C0AAE844DB311D2325A52DB41
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 289d4130dd4f9bdca88bb23700b0c2e5afad06515cb0be90bf2e44424b39bff5
                                          • Instruction ID: 2e819a4a10ad4cbfe8f43a99af311c20801d219298ac9faeed2b7e38f9360a23
                                          • Opcode Fuzzy Hash: 289d4130dd4f9bdca88bb23700b0c2e5afad06515cb0be90bf2e44424b39bff5
                                          • Instruction Fuzzy Hash: FB01EF74A042288FCB65DF24C9506EABBB2FB49300F5046E9D54DA7354EB359E81CFA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5919e076e8001dde2a7f9ff40a09aeb705d930b24b7fd552a79bb2dca648871e
                                          • Instruction ID: 89a01f67dc03e2c3b387d4d42f6a618f7c160ec2428339869d82801d16c29e58
                                          • Opcode Fuzzy Hash: 5919e076e8001dde2a7f9ff40a09aeb705d930b24b7fd552a79bb2dca648871e
                                          • Instruction Fuzzy Hash: 3F01F674A002288FCB55EF24C9507DABBB2FB49300F1049E9C589A7354DBB49EC18FA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc69c7376a4de75c13042a0be205a3cc382df9d765fc6272b550aa027375e60f
                                          • Instruction ID: bdd1a2a44f5f3d32ce373a2b5d93d8352cfe6a83b30535949095a44930b1cf3a
                                          • Opcode Fuzzy Hash: bc69c7376a4de75c13042a0be205a3cc382df9d765fc6272b550aa027375e60f
                                          • Instruction Fuzzy Hash: 2B01E8749042188FCB54DF64C95469A7BF2FB49300F60C4E9D58DA7358DE349E859F90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5ac9623427fcc2f0bc958256c68a7721cb6017e142c30197a0e8f9dc414e932
                                          • Instruction ID: 073c4535a05ae9d36f6c845e18d02e08eea9566dd6cdfe50d61fde50dfce5b6d
                                          • Opcode Fuzzy Hash: f5ac9623427fcc2f0bc958256c68a7721cb6017e142c30197a0e8f9dc414e932
                                          • Instruction Fuzzy Hash: 7701F674A0035C8FCB64EF64C95479ABBB2FB4A300F1085E9D50A93B54EB389E85DF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b645b7b1ccccd5f304560d1e321bc9d6ad1c137b7035e7ec6f7590e9e731624
                                          • Instruction ID: 1d65b38630f831e4d04b1eb02d60ef0e01f3444e4133073ae5638aacf709c4ab
                                          • Opcode Fuzzy Hash: 9b645b7b1ccccd5f304560d1e321bc9d6ad1c137b7035e7ec6f7590e9e731624
                                          • Instruction Fuzzy Hash: C501FB74900A588FCB54DF28CD6079B7BB2FB48302F5044E9C44DA7354EA355E85DF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80ad1ec7788badee77d7b1ba8c5515c416037187d736d68893a46c9b0c933c99
                                          • Instruction ID: 7fbcaa2b53844b08fc3674ab439d65f9e458719b4cadfab062491261913e582d
                                          • Opcode Fuzzy Hash: 80ad1ec7788badee77d7b1ba8c5515c416037187d736d68893a46c9b0c933c99
                                          • Instruction Fuzzy Hash: 0FF01D74E00208CFCB55DFA8C55069EBBB2FF49300F20442AD549A7355EB34AD46DF61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 76e6c86b5368418bee22918923703a61edc4a4695b4bc6838ccf58eab08ad622
                                          • Instruction ID: b61f460af02fda1cefe163e37db4b5e3dc510ed786787607894461c18498916d
                                          • Opcode Fuzzy Hash: 76e6c86b5368418bee22918923703a61edc4a4695b4bc6838ccf58eab08ad622
                                          • Instruction Fuzzy Hash: B7011D74A043188FCB65DF68CA50799B7B2FB49304F1044E9C50D97756EB34AE81DF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9b976ef0f86de1c14bc0431a1d55619a328b90baaef683feef887cba02b8397
                                          • Instruction ID: f555972a27329c0e03926c9dabe4cbe37b9574e84ec180a1ae7e2f07ba01f003
                                          • Opcode Fuzzy Hash: a9b976ef0f86de1c14bc0431a1d55619a328b90baaef683feef887cba02b8397
                                          • Instruction Fuzzy Hash: 5B0119B4A022288FEB55DF64C99079ABBB2FB89300F1044E9C509A7356DB769E85CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06c80ca3bbbeb7bdf623841129d72060adfb43cceda1794522ac8039f3738350
                                          • Instruction ID: ead2255b48515bf783fa04d82d7d37ee99e4e94a0ed7a40d941df4bd4f7aa59d
                                          • Opcode Fuzzy Hash: 06c80ca3bbbeb7bdf623841129d72060adfb43cceda1794522ac8039f3738350
                                          • Instruction Fuzzy Hash: 7F01FB78A002188FCB64DF54C95079E7BB2FB89300F1044E9D50D97B54DF745E819F52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df8128daca603a31fca347fa8c253c7426aa66e9a20d1926b3d96cc4572e5399
                                          • Instruction ID: cb03e624116e0d9a0c7b0abca8977705607f424129d579751c8ea6d6ccf30ddf
                                          • Opcode Fuzzy Hash: df8128daca603a31fca347fa8c253c7426aa66e9a20d1926b3d96cc4572e5399
                                          • Instruction Fuzzy Hash: 8F014631A001288FCB60EFA4D95479ABBB2FB4C300F1084EAC409A3315EE349E859F60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 50fdeffe4b7bac9f9e903ab6a2bbfe8c7d1fce8355fadaa6095b2aed5d9ab26e
                                          • Instruction ID: 3fb30286d9a970922751f01e3180415bc8a77ee077a2ee903b208afd4815d863
                                          • Opcode Fuzzy Hash: 50fdeffe4b7bac9f9e903ab6a2bbfe8c7d1fce8355fadaa6095b2aed5d9ab26e
                                          • Instruction Fuzzy Hash: F801E474A00A288FCB94DF68CD5069ABBB3FB88306F1045E9C409A7354DF369E998F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c6bd24a11aa00fa6b09a5a80f85786e500867e2ea01e3bcb922d3e5c9d2bb76
                                          • Instruction ID: dccbef06350b55a23d5c534e3517351edefcddbb9c82c4182e8d82bef4592231
                                          • Opcode Fuzzy Hash: 1c6bd24a11aa00fa6b09a5a80f85786e500867e2ea01e3bcb922d3e5c9d2bb76
                                          • Instruction Fuzzy Hash: 2A01E8B498221ACFEB54DF24CA547AA7BB2FB88300F1046F9D419E3356DB349E858F50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 960eb79b2cfdfd389617867b7abbacfc5355c457a8026509491a41c63f3c594e
                                          • Instruction ID: e2fbb807be3c7ee4320c397306b016c46d56169574560e1a9e41673e1de087af
                                          • Opcode Fuzzy Hash: 960eb79b2cfdfd389617867b7abbacfc5355c457a8026509491a41c63f3c594e
                                          • Instruction Fuzzy Hash: 8B011974A012288FDB64DF24C991B9ABBB3FB88300F1045E9C50D97355DE369E91CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 104ec9bb9da8ff035eebabca5d11ae4084d70a5619c086e4be482660a41f9864
                                          • Instruction ID: e51804b849f1f8fcb6e530e38f64575d20838405c846a76c964dd11603494fa3
                                          • Opcode Fuzzy Hash: 104ec9bb9da8ff035eebabca5d11ae4084d70a5619c086e4be482660a41f9864
                                          • Instruction Fuzzy Hash: C5F03430E04288AFCB42CFA8D4916ACBFB1EF4A214F1881EAC85897312D2365A16DF41
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 711ade537b6b2af31587dd25f773865a5c6ec74e0099b5a5c6b12458b1935b30
                                          • Instruction ID: 8f7beef4df33d1fa70a9010ec159c1efe1592c1f7926cc8ee5313c4c7fda6f30
                                          • Opcode Fuzzy Hash: 711ade537b6b2af31587dd25f773865a5c6ec74e0099b5a5c6b12458b1935b30
                                          • Instruction Fuzzy Hash: 50F0F270E05248AFCB50DFB8D986ADDBFB1EB49314F18C1AAD81897312D7329A56CF41
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 345e3e42f744fdc41a39e6a4c0007673682f87b074c2f5deaaabde8501572ea8
                                          • Instruction ID: da7639b7e70c676838bf6bec8ba083cbba2f99ff3dcc7b18e2b54fc12271c7a8
                                          • Opcode Fuzzy Hash: 345e3e42f744fdc41a39e6a4c0007673682f87b074c2f5deaaabde8501572ea8
                                          • Instruction Fuzzy Hash: C0E0C274E00208EFCB44DFA8D945A9CBBF1EB48310F10C1AAA818A3340D732AA51DF95
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e14b30924a9e6e3e989c9b118577c7a624b5b9b3c64fa0f1f6a48daa5b3dbab5
                                          • Instruction ID: 3937cd0dc474a6cd8d0602f24a17ed412872be177ccde81028c2f6e80bd609c3
                                          • Opcode Fuzzy Hash: e14b30924a9e6e3e989c9b118577c7a624b5b9b3c64fa0f1f6a48daa5b3dbab5
                                          • Instruction Fuzzy Hash: 2FE0ED34D092598FCB11DF24C9406ADB7B5FF46304F2489E6C84DA3245EB749E46DFA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ca4429f48324f9cf7fad175b5e8cdf558db83d406e7f8b891960200c1b62425
                                          • Instruction ID: da4f48bbfc3ec67590138dfdbd748624846b12c24d642518bbfb3bc529b179e0
                                          • Opcode Fuzzy Hash: 5ca4429f48324f9cf7fad175b5e8cdf558db83d406e7f8b891960200c1b62425
                                          • Instruction Fuzzy Hash: 71E04F34905244DFC706DFA8D85169CBFB0EF4A205F5880E9DC449B362D6319D57D792
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d07e2fe6fb2889096bf2aa37d945703cbe3e3a76deb52874b936ef04680ca756
                                          • Instruction ID: 1c71c2f492efc33dc2f0400b4d189c52d15c0738bcd24f0fd7bb98eca8eec124
                                          • Opcode Fuzzy Hash: d07e2fe6fb2889096bf2aa37d945703cbe3e3a76deb52874b936ef04680ca756
                                          • Instruction Fuzzy Hash: 23E07574E00208EFCB44DFA8D545A9DBBF4EB48315F14C1A9981893351D7369A51DF91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6fc9e78ea126ef7c727afd8baeb25592dce63646c77a3149dc373f4fda6a5b92
                                          • Instruction ID: 8c32a0568b7d88cb2900c5de182f0f4f50c0dd29759fd9c49c7541c6d8d33aab
                                          • Opcode Fuzzy Hash: 6fc9e78ea126ef7c727afd8baeb25592dce63646c77a3149dc373f4fda6a5b92
                                          • Instruction Fuzzy Hash: 95D0132014E3854FD71367649C543647F745B07316FC90192D944C65E3C7DD5459C3BB
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2112657300.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_da0000_MSBuild.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 641c88f917df7eac4ce3c8b6e481d94b50c561c8321249f6cdb15441917a0357
                                          • Instruction ID: 475b83f11cf07e9ffdb625c5a584074818c1aa699cafdca3b96ef5c01552c206
                                          • Opcode Fuzzy Hash: 641c88f917df7eac4ce3c8b6e481d94b50c561c8321249f6cdb15441917a0357
                                          • Instruction Fuzzy Hash: 38B09B3004171486D5156794F9097647A98670631BFC40110A90D41561C7A59450C5FF